Analysis

  • max time kernel
    42s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    19-01-2021 12:15

General

  • Target

    50f6254a4635d1e5e588d80eb8987f4b.exe

  • Size

    1018KB

  • MD5

    50f6254a4635d1e5e588d80eb8987f4b

  • SHA1

    61143c57867e6799e52bf6d3d456b4efd92ced41

  • SHA256

    cc26bac0f47c7d3853f301243a6cca755b3eebd571133ddbb247998caa8d8682

  • SHA512

    40d5714d0f9c0c5452e08c11b41540ac6e35558fdfcd343b56ac576a29b8a0ad3abb9265ab79a9eb683b9b6d0668aac5116abe441ecf260fea6b2b5f55985ddb

Malware Config

Extracted

Family

formbook

C2

http://www.bytecommunication.com/aky/

Decoy

jeiksaoeklea.com

sagame-auto.net

soloseriolavoro.com

thecreatorsbook.com

superskritch.com

oroxequipment.com

heart-of-art.online

liwedfg.com

fisherofsouls.com

jota.xyz

nehyam.com

smart-contact-delivery.com

hoom.guru

dgryds.com

thesoakcpd.com

mishv.com

rings-factory.info

bero-craft-beers.com

podcastnamegenerators.com

856379813.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50f6254a4635d1e5e588d80eb8987f4b.exe
    "C:\Users\Admin\AppData\Local\Temp\50f6254a4635d1e5e588d80eb8987f4b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:496
    • C:\Users\Admin\AppData\Local\Temp\50f6254a4635d1e5e588d80eb8987f4b.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:204

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/204-12-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/204-13-0x000000000041EB60-mapping.dmp
  • memory/204-15-0x0000000001BA0000-0x0000000001EC0000-memory.dmp
    Filesize

    3.1MB

  • memory/496-2-0x0000000073D40000-0x000000007442E000-memory.dmp
    Filesize

    6.9MB

  • memory/496-3-0x0000000000BE0000-0x0000000000BE1000-memory.dmp
    Filesize

    4KB

  • memory/496-5-0x0000000005AA0000-0x0000000005AA1000-memory.dmp
    Filesize

    4KB

  • memory/496-6-0x00000000055A0000-0x00000000055A1000-memory.dmp
    Filesize

    4KB

  • memory/496-7-0x0000000005730000-0x0000000005731000-memory.dmp
    Filesize

    4KB

  • memory/496-8-0x0000000005530000-0x0000000005531000-memory.dmp
    Filesize

    4KB

  • memory/496-9-0x0000000005760000-0x000000000576E000-memory.dmp
    Filesize

    56KB

  • memory/496-10-0x00000000078A0000-0x00000000078ED000-memory.dmp
    Filesize

    308KB

  • memory/496-11-0x0000000007990000-0x0000000007991000-memory.dmp
    Filesize

    4KB