Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    31-01-2022 17:19

General

  • Target

    scan._bank_transfer_alhali_bank_12_09_2021.exe

  • Size

    595KB

  • MD5

    2bf76c0c064f27112084d2b519c5c5f0

  • SHA1

    1776615c937ec34b85d6333ab02d0571afffb6f6

  • SHA256

    31573322ef0e4c9d77a36ba43b66edc88da6d66a7be519d118b7c01d0986baca

  • SHA512

    b9ed3eb56cc3838c67d56c5eff065a876c0599d60a400a0eb0c722ad9ce0658379383635ed0393cce8007688e174e425196d8aa8fef80e88049588da09583cc2

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

im8r

Decoy

rivoluzione2020.online

palacesaintgermain.com

creatri.com

krazzyhost.com

xxxstreaming.online

perfectoptionsfx.com

creativebay.art

hazelineshop.com

stfpk.com

flaxx.life

symphonyone.info

amlakzamanpor.com

indianhomehealthcare.net

blacktanandwhite.com

kannabofy.com

anthonycrivello.com

eduvill.net

bonnybuy.com

burneteris.info

mysarasotahomevalue.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\scan._bank_transfer_alhali_bank_12_09_2021.exe
    "C:\Users\Admin\AppData\Local\Temp\scan._bank_transfer_alhali_bank_12_09_2021.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\Temp\scan._bank_transfer_alhali_bank_12_09_2021.exe
      "C:\Users\Admin\AppData\Local\Temp\scan._bank_transfer_alhali_bank_12_09_2021.exe"
      2⤵
        PID:992
      • C:\Users\Admin\AppData\Local\Temp\scan._bank_transfer_alhali_bank_12_09_2021.exe
        "C:\Users\Admin\AppData\Local\Temp\scan._bank_transfer_alhali_bank_12_09_2021.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1084

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/756-54-0x0000000001380000-0x000000000141C000-memory.dmp
      Filesize

      624KB

    • memory/756-55-0x0000000075431000-0x0000000075433000-memory.dmp
      Filesize

      8KB

    • memory/756-56-0x0000000000760000-0x0000000000761000-memory.dmp
      Filesize

      4KB

    • memory/756-57-0x0000000000290000-0x000000000029E000-memory.dmp
      Filesize

      56KB

    • memory/756-58-0x00000000050C0000-0x000000000512C000-memory.dmp
      Filesize

      432KB

    • memory/756-59-0x00000000006A0000-0x00000000006D4000-memory.dmp
      Filesize

      208KB

    • memory/1084-60-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1084-61-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1084-62-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB