Analysis

  • max time kernel
    120s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    27-07-2021 05:49

General

  • Target

    bdeac23022bd4b5499d23471e51d2c96c2048475f72da65a98064b551d3d72b9.exe

  • Size

    511KB

  • MD5

    bacc243ec00ce90570cde50f458e1d1d

  • SHA1

    bf6c61f77a8e79890f88c1fdb84e640f60a83b13

  • SHA256

    bdeac23022bd4b5499d23471e51d2c96c2048475f72da65a98064b551d3d72b9

  • SHA512

    607043ae17e0432f78bebe32b4e3ab88631795a8981c738c1fa61a721e3ef45f4da1a446482fb9ee39956cf39fc3cfe32b51c7853e7caffd63064290518d0155

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.orchardviewbostons.com/g65/

Decoy

axsnaplp.icu

hmizat-khouribga.com

dishantnarang.com

ratchakarn.net

seatoskyphotos.com

emodel88.com

rajroyalepromoters.com

lzsfdnrm.com

premierpropertiesms.com

embodimentawareness.com

xn--q3ca0aaec3a1i6ah5eyf5a.com

yc8807.com

communitycouponbook.com

commercialbeach.com

elnurtic.com

edancesportradio.net

forcedir.com

zgzhzm.com

top-specials99.com

redwoodvisitor.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdeac23022bd4b5499d23471e51d2c96c2048475f72da65a98064b551d3d72b9.exe
    "C:\Users\Admin\AppData\Local\Temp\bdeac23022bd4b5499d23471e51d2c96c2048475f72da65a98064b551d3d72b9.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Users\Admin\AppData\Local\Temp\bdeac23022bd4b5499d23471e51d2c96c2048475f72da65a98064b551d3d72b9.exe
      "C:\Users\Admin\AppData\Local\Temp\bdeac23022bd4b5499d23471e51d2c96c2048475f72da65a98064b551d3d72b9.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:524

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/524-66-0x000000000041EE10-mapping.dmp
  • memory/524-65-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/524-67-0x0000000000C00000-0x0000000000F03000-memory.dmp
    Filesize

    3.0MB

  • memory/1032-60-0x0000000000B70000-0x0000000000B71000-memory.dmp
    Filesize

    4KB

  • memory/1032-62-0x0000000004080000-0x0000000004081000-memory.dmp
    Filesize

    4KB

  • memory/1032-63-0x00000000009E0000-0x00000000009E4000-memory.dmp
    Filesize

    16KB

  • memory/1032-64-0x0000000005350000-0x00000000053AB000-memory.dmp
    Filesize

    364KB