Analysis

  • max time kernel
    42s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2022 15:14

General

  • Target

    765ed4f4607cc86d76be8e42930e43ba0c833866fb6bdd9b97c23241a46c6725.exe

  • Size

    576KB

  • MD5

    104a0fd298792b9a5d0c6a9113822a34

  • SHA1

    4dee1d7dc239bcf8810f3ffc201ba5d203101f4d

  • SHA256

    765ed4f4607cc86d76be8e42930e43ba0c833866fb6bdd9b97c23241a46c6725

  • SHA512

    d935416d2d20872cfe4a958c6557386f5945fc5739f30a293119412423b9657d097dbcdbaa29cbf01cd496a4466af206a8e77cda46a7d1c5f92057766c56d128

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

un

Decoy

mtbeautyshop.com

tactilon.online

bghuqo.com

ethansung.com

learntoskimboard.com

pzaintl.com

oaiteamv.com

advantahc.com

kudzuandcottoncompany.net

racinesdespres.com

go-kart-kits.com

travelbytravant.com

magamag.com

zhishengda.net

kamikacomics.com

colegiosantodomingord.com

apppose.com

esperandoporvoce.com

smartmallshopping.com

wwwvns9722.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\765ed4f4607cc86d76be8e42930e43ba0c833866fb6bdd9b97c23241a46c6725.exe
    "C:\Users\Admin\AppData\Local\Temp\765ed4f4607cc86d76be8e42930e43ba0c833866fb6bdd9b97c23241a46c6725.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:544
    • C:\Users\Admin\AppData\Local\Temp\765ed4f4607cc86d76be8e42930e43ba0c833866fb6bdd9b97c23241a46c6725.exe
      C:\Users\Admin\AppData\Local\Temp\765ed4f4607cc86d76be8e42930e43ba0c833866fb6bdd9b97c23241a46c6725.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/544-56-0x00000000004A0000-0x00000000004A7000-memory.dmp

    Filesize

    28KB

  • memory/544-57-0x0000000075661000-0x0000000075663000-memory.dmp

    Filesize

    8KB

  • memory/544-59-0x00000000004A0000-0x00000000004A7000-memory.dmp

    Filesize

    28KB

  • memory/544-60-0x0000000077610000-0x00000000777B9000-memory.dmp

    Filesize

    1.7MB

  • memory/544-61-0x00000000777F0000-0x0000000077970000-memory.dmp

    Filesize

    1.5MB

  • memory/2032-63-0x0000000000400000-0x0000000000492000-memory.dmp

    Filesize

    584KB

  • memory/2032-64-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2032-65-0x00000000001B0000-0x00000000001B7000-memory.dmp

    Filesize

    28KB

  • memory/2032-66-0x0000000077610000-0x00000000777B9000-memory.dmp

    Filesize

    1.7MB

  • memory/2032-67-0x00000000777F0000-0x0000000077970000-memory.dmp

    Filesize

    1.5MB

  • memory/2032-68-0x0000000006770000-0x0000000006A73000-memory.dmp

    Filesize

    3.0MB