Analysis

  • max time kernel
    44s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 12:42

General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.26326.25002.exe

  • Size

    573KB

  • MD5

    761d7c3beb6db8dba8db49fa54077d29

  • SHA1

    2258d890134463dc7e950d49cb49d3980e01bc43

  • SHA256

    2a08c4a174a0c90f8e3981182172493c1e729668fce404401a7e20be3d8d8beb

  • SHA512

    58cf7fd319668a1fa3a3da64fd19aea95e539072839431e3698b6a6b35426e5862eb23fe1de0152dde3d546dc5ae6cba217c12cd3d077a4d5c3fa62ecddb3b75

  • SSDEEP

    6144:1pqYmkA0GoPzz6qey+humMdxMDkKrIgnvom8Wop9tQ8WlYxhm874cygVpbeIn:DqVkkoPzz6s4MArI+1op9tQFYPUceIn

Malware Config

Extracted

Family

formbook

Campaign

89nz

Decoy

f5/fq8w+OoW8

yfF5aDC+a77IU5uNwg==

fcP52Pw8btvvHGs=

xlWev+vyUYaayOhQz31CKw==

TXm6fqVrL1rld+2kYTs=

pzmKyuutwjpXaw==

nkGJnaRgZkxwDLEt

ZtcubEwMqwo0PC2bZLFVPZOmx48KaA==

zOYBjKhvKlfarqaZWDk=

XSfxjejZ1kdpcg==

Fw6bd6milZCJYv2rLnsaAeXntjpDRhwI

Neg+ja9ha1tCINW9hnlWy3tggj0=

Z+AgTYx/9gFyeKaZWDk=

R3MJITDvAQ8r+U3KgdvjIw==

uEuR4fu5BUX9inDuo5Vhy3tggj0=

tXuu7VjnO3iTU5uNwg==

X27n3e6r6yk+O2EaudIo8u0e4zU=

zVr1V2MPRYJA2uPaz31CKw==

xskKu/XzzBhzSRzlz31CKw==

YYC/T1wADpNmLG4=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.26326.25002.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.26326.25002.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.26326.25002.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.26326.25002.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1248

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1248-64-0x00000000004012B0-mapping.dmp

  • memory/1248-60-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1248-61-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1248-63-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1248-66-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1248-67-0x0000000000401000-0x000000000042F000-memory.dmp

    Filesize

    184KB

  • memory/1248-68-0x0000000000900000-0x0000000000C03000-memory.dmp

    Filesize

    3.0MB

  • memory/1412-55-0x0000000075771000-0x0000000075773000-memory.dmp

    Filesize

    8KB

  • memory/1412-56-0x0000000000700000-0x0000000000716000-memory.dmp

    Filesize

    88KB

  • memory/1412-57-0x0000000000720000-0x000000000072E000-memory.dmp

    Filesize

    56KB

  • memory/1412-58-0x0000000007DA0000-0x0000000007E10000-memory.dmp

    Filesize

    448KB

  • memory/1412-59-0x0000000004770000-0x00000000047A4000-memory.dmp

    Filesize

    208KB

  • memory/1412-54-0x0000000000CE0000-0x0000000000D76000-memory.dmp

    Filesize

    600KB