Analysis

  • max time kernel
    158s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2022, 16:04

General

  • Target

    5b24cd0bee40fbc64c05e75ae25859385403d66e2bfa94cc54e23660586e6f1c.exe

  • Size

    236KB

  • MD5

    c50a2cc60d44200eb6c7573c4c422873

  • SHA1

    0ddc105fdf443d24f56e013e55828ed111df3270

  • SHA256

    5b24cd0bee40fbc64c05e75ae25859385403d66e2bfa94cc54e23660586e6f1c

  • SHA512

    b5bc4deec050a33909eabde3e76f641f30dd97cf6593f34e3920c01ef96512ec6a00a7059a3991d9a0408119829c6794131897c61c60c69c7b694e17002512e4

  • SSDEEP

    6144:qNSGIR41RPlyHW93igGDeT01awFKrQpap:6SGe41BlB93nTOTKaa

Malware Config

Extracted

Family

formbook

Campaign

ugez

Decoy

LgjapC4PTUnlPZWoC2UR5y8=

YMcK0wipjKwrmU7k

L5jlvYmPL3umP9c=

4rk/LiDD0RVVSIeRjZIUL0yl

AGSrXyvwS7a8fQEgidyDSzLHVenNiQ==

AtaekTjB3r2qqTfZQ+nnfLfTpA==

Q9I1IDrVM5RLBER0xA==

NEdf4hHw/2eq

+4rt0uLIddbs7Ndu0w==

heAb+B+SqeStNcPpzt3FhJrTev0=

OZ6kdeZpuv0Y6fXR/wTX

6sB4ZTgDPyMyIl37yOxispUQrOYd6yM=

OiarhHzxBOZn+Yqoi6hAT2mv

tVdc2q/vCrrutQ==

8t1UGhc2L3umP9c=

rJgg1o0wO6Voug==

l4NQQt5dsBqlgcvs

mCeljHYpvxG2NOv3c+XRoEs2O0vhgQ==

a84dAkkSZ2X6NEdbRRAo7yobFJTz

06yBZcaFMnD6SoWoj6hAT2mv

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Blocklisted process makes network request 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Users\Admin\AppData\Local\Temp\5b24cd0bee40fbc64c05e75ae25859385403d66e2bfa94cc54e23660586e6f1c.exe
      "C:\Users\Admin\AppData\Local\Temp\5b24cd0bee40fbc64c05e75ae25859385403d66e2bfa94cc54e23660586e6f1c.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4836
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4768
    • C:\Windows\SysWOW64\cscript.exe
      "C:\Windows\SysWOW64\cscript.exe"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4300
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:4340

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1040-147-0x0000000003860000-0x00000000038F5000-memory.dmp

            Filesize

            596KB

          • memory/1040-145-0x0000000003860000-0x00000000038F5000-memory.dmp

            Filesize

            596KB

          • memory/1040-138-0x0000000008680000-0x0000000008804000-memory.dmp

            Filesize

            1.5MB

          • memory/4300-143-0x00000000024B0000-0x00000000027FA000-memory.dmp

            Filesize

            3.3MB

          • memory/4300-146-0x0000000000220000-0x000000000024B000-memory.dmp

            Filesize

            172KB

          • memory/4300-144-0x0000000002310000-0x000000000239F000-memory.dmp

            Filesize

            572KB

          • memory/4300-141-0x0000000000250000-0x0000000000277000-memory.dmp

            Filesize

            156KB

          • memory/4300-142-0x0000000000220000-0x000000000024B000-memory.dmp

            Filesize

            172KB

          • memory/4768-136-0x0000000001690000-0x00000000019DA000-memory.dmp

            Filesize

            3.3MB

          • memory/4768-140-0x0000000000400000-0x000000000042B000-memory.dmp

            Filesize

            172KB

          • memory/4768-137-0x0000000001230000-0x0000000001240000-memory.dmp

            Filesize

            64KB

          • memory/4768-134-0x0000000000400000-0x000000000042B000-memory.dmp

            Filesize

            172KB

          • memory/4836-132-0x0000000000D70000-0x0000000000DAE000-memory.dmp

            Filesize

            248KB