Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2022, 17:11

General

  • Target

    Booking details.exe

  • Size

    1.2MB

  • MD5

    64d38a2ad50e4af64d28d9086e36c37d

  • SHA1

    11cbfad75d83639e5128c78bf256306751a71299

  • SHA256

    edb793d2433f2bcb4651c6576a8f47ff87d258dfaf5a5bf4194701e61f3a6910

  • SHA512

    aefe6cb3e9b8eb7707695b30ee610ef5ec41de50a8410cb3252de0f6eb4428d9edb9f64ea9c680327a87b90718e4f5b1307e6dac548026f67c7ff6c375f299b4

  • SSDEEP

    12288:f1I41hw4e/ehLrzZ3q469R5bfamxgHc/8mA3GQ9xklET7e0+GwFLJLevHyparGQ7:uL4LJFITamqHc/88Q9xklFG86H1GWv4

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

rsea

Decoy

aylagrey.com

ketoodavoqslim.xyz

foyfoy.ltd

buymistnow.com

ownempire.net

cie-revolver.com

kedaimks.com

rockbettergear.com

luminousfadel.com

universalbumpkeys.com

enjoyablestopnshop.com

grandesfinanzas.com

professionmessaging.com

thtoughthenight.com

conservativesshop.com

jimihoodie.com

nhlove.net

agentsheila.com

tilemarkng.com

94ei6mgy.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Local\Temp\Booking details.exe
      "C:\Users\Admin\AppData\Local\Temp\Booking details.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3776
      • C:\Users\Admin\AppData\Local\Temp\Booking details.exe
        "C:\Users\Admin\AppData\Local\Temp\Booking details.exe"
        3⤵
          PID:2524
        • C:\Users\Admin\AppData\Local\Temp\Booking details.exe
          "C:\Users\Admin\AppData\Local\Temp\Booking details.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4500
      • C:\Windows\SysWOW64\systray.exe
        "C:\Windows\SysWOW64\systray.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2184
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\Booking details.exe"
          3⤵
            PID:4388

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2184-156-0x0000000000390000-0x00000000003BF000-memory.dmp

              Filesize

              188KB

            • memory/2184-154-0x0000000002460000-0x00000000024F3000-memory.dmp

              Filesize

              588KB

            • memory/2184-152-0x0000000000390000-0x00000000003BF000-memory.dmp

              Filesize

              188KB

            • memory/2184-151-0x0000000002570000-0x00000000028BA000-memory.dmp

              Filesize

              3.3MB

            • memory/2184-150-0x0000000000FA0000-0x0000000000FA6000-memory.dmp

              Filesize

              24KB

            • memory/2864-144-0x00000000026E0000-0x0000000002860000-memory.dmp

              Filesize

              1.5MB

            • memory/2864-157-0x00000000079A0000-0x0000000007ACC000-memory.dmp

              Filesize

              1.2MB

            • memory/2864-155-0x00000000079A0000-0x0000000007ACC000-memory.dmp

              Filesize

              1.2MB

            • memory/2864-147-0x0000000002580000-0x000000000264B000-memory.dmp

              Filesize

              812KB

            • memory/3776-132-0x00000000002D0000-0x0000000000402000-memory.dmp

              Filesize

              1.2MB

            • memory/3776-134-0x0000000004DC0000-0x0000000004E52000-memory.dmp

              Filesize

              584KB

            • memory/3776-133-0x0000000005370000-0x0000000005914000-memory.dmp

              Filesize

              5.6MB

            • memory/3776-135-0x0000000004F50000-0x0000000004F5A000-memory.dmp

              Filesize

              40KB

            • memory/3776-136-0x00000000092D0000-0x000000000936C000-memory.dmp

              Filesize

              624KB

            • memory/3776-137-0x00000000093C0000-0x0000000009426000-memory.dmp

              Filesize

              408KB

            • memory/4500-149-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/4500-143-0x00000000019B0000-0x00000000019C4000-memory.dmp

              Filesize

              80KB

            • memory/4500-145-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/4500-142-0x0000000001A50000-0x0000000001D9A000-memory.dmp

              Filesize

              3.3MB

            • memory/4500-146-0x0000000001A00000-0x0000000001A14000-memory.dmp

              Filesize

              80KB

            • memory/4500-140-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB