Analysis

  • max time kernel
    154s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 08:06

General

  • Target

    ZiraatBankasi-SwiftMesaji20221123.exe

  • Size

    1.1MB

  • MD5

    0f46ecb9b5ea6f5fcbaf7056c316259c

  • SHA1

    bc171b3c828566a705e82dce3a96f78e836c2dd1

  • SHA256

    8a530805d14a1d39f4016d711091acc26f7404a1dca050407f6d6ba4eeaef0f5

  • SHA512

    8fdde0979eb61549793725bb95455291a32ef7b674af43602239e697886941d4189d35ceb9b70b5e440b4f480fa8e333dbb960b4b7f586061697296d14a73bb4

  • SSDEEP

    24576:8sGpbZ7QlqRYYlQ6SdVqeK0kUBwUaFkwWR+UBqdOp:iNJtRMnV0UcywWR+UBqdO

Malware Config

Extracted

Family

formbook

Campaign

go5o

Decoy

fS9ce6bj/U7J6Q==

KPSUZUVU42J3IaXPjqsA

cDR9Sz1n2BN9eTutNa2QNg==

POJskuyBUqUdVp2wiI8=

t9gcQ5yNydIfrO4=

9oakDnoh0VXC

o2Z9n/2iYtDFcJ2wiI8=

GLBJZsgVkt3eXZragNJjYiGQ

axuNlck5BkA8plrI

khk2/+G5g43K

Fauoa7FQG6EN2QyITg==

fgaVrOb4mLl1KGNUX6jkXCU=

HQkML53cm6Ae+zIhRg==

TBodPq4E4AJylpZiNa2QNg==

wHghSq49EVU54E8mChOvRi5W3cn3ItLVVw==

rET2JY8u+TgVpzRtRF54Kw==

b0mCXc5pcXHZ9A==

QfuIoOgHl9IfrO4=

87fV+WQT5IKlSnTqmb6SbSMctA==

E+Yg8EqQKJi9XJKVqrA2i9TO78H53I97

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi-SwiftMesaji20221123.exe
    "C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi-SwiftMesaji20221123.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4424
    • C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi-SwiftMesaji20221123.exe
      "C:\Users\Admin\AppData\Local\Temp\ZiraatBankasi-SwiftMesaji20221123.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4412

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4412-137-0x0000000000000000-mapping.dmp

  • memory/4412-138-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4412-140-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4412-141-0x0000000000401000-0x000000000042F000-memory.dmp

    Filesize

    184KB

  • memory/4412-142-0x00000000010E0000-0x000000000142A000-memory.dmp

    Filesize

    3.3MB

  • memory/4424-132-0x0000000000C90000-0x0000000000DB6000-memory.dmp

    Filesize

    1.1MB

  • memory/4424-133-0x0000000005C90000-0x0000000006234000-memory.dmp

    Filesize

    5.6MB

  • memory/4424-134-0x0000000005780000-0x0000000005812000-memory.dmp

    Filesize

    584KB

  • memory/4424-135-0x0000000005770000-0x000000000577A000-memory.dmp

    Filesize

    40KB

  • memory/4424-136-0x0000000009770000-0x000000000980C000-memory.dmp

    Filesize

    624KB