Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-08-2022 06:40

General

  • Target

    fc6dd1debc45ce8b420b281bda6fdf1bc103e4c977009a954924ca50d95bd7ba.exe

  • Size

    320KB

  • MD5

    f6c8a8e5346a698e0733248a0ec6e323

  • SHA1

    6e0be3bcd53afae69635fdecb1b7f350f9306563

  • SHA256

    fc6dd1debc45ce8b420b281bda6fdf1bc103e4c977009a954924ca50d95bd7ba

  • SHA512

    076578e7d60d26215fb7f43b58873abda5ee83bf31d8969b0a0ca9a8bdf91774487ece9d6ffb6a32c57154269d84f9ac2c3926bc76e944b87c59fc9f2d5dfd84

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

eni9

Decoy

serenatutino.com

oshuncleaningservices.com

themodernring.com

elhoodurbano.com

borntobeabrand.com

wingene168.com

raising.cloud

kumen.store

azdistribution.store

myrecordingapp.com

minshu.info

zhongxiangxinge.com

linentemptation.com

corealestatevideo.com

carpection.com

mompreneur.services

ent34.com

udicoin.net

trulyclassical.com

paraalemdatela.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc6dd1debc45ce8b420b281bda6fdf1bc103e4c977009a954924ca50d95bd7ba.exe
    "C:\Users\Admin\AppData\Local\Temp\fc6dd1debc45ce8b420b281bda6fdf1bc103e4c977009a954924ca50d95bd7ba.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Users\Admin\AppData\Local\Temp\fc6dd1debc45ce8b420b281bda6fdf1bc103e4c977009a954924ca50d95bd7ba.exe
      "C:\Users\Admin\AppData\Local\Temp\fc6dd1debc45ce8b420b281bda6fdf1bc103e4c977009a954924ca50d95bd7ba.exe"
      2⤵
        PID:2376
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 184
          3⤵
          • Program crash
          PID:1996
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2376 -ip 2376
      1⤵
        PID:1272

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1816-130-0x0000000000E90000-0x0000000000EE4000-memory.dmp
        Filesize

        336KB

      • memory/1816-131-0x0000000005D50000-0x00000000062F4000-memory.dmp
        Filesize

        5.6MB

      • memory/2376-132-0x0000000000000000-mapping.dmp
      • memory/2376-134-0x0000000000800000-0x000000000082F000-memory.dmp
        Filesize

        188KB