Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2023 07:01

General

  • Target

    6546a7ea064c3d9f64088e019d9886f58524c335.exe

  • Size

    836KB

  • MD5

    8ba209a4fa3662aa0bbe28789524a293

  • SHA1

    6546a7ea064c3d9f64088e019d9886f58524c335

  • SHA256

    34c78648a400263531a09c99c5979b2520b7705bede0b48773cd2ec5cb88cdd7

  • SHA512

    18ce206118e2bf27469afbdf275b99fc611028cb01c468405e9362725896954b5417ae7e72869b50e5489663b44a4b0bbfdeb93eb66afcf2b7ca7e4e2f4d65f4

  • SSDEEP

    12288:kF1ptxzc/f9C80BNM1o3t64Vhe7VulmSb9kLON9b5Wx:mnz2fE80BS1o3t5Vs7bqVN9k

Malware Config

Extracted

Family

formbook

Campaign

g44n

Decoy

t60gB4YRvsDLttd9HG4=

xck8G7COQ+g7VIpX

BQQF3mmpLPskhQ==

eLWwmzNyK6ee+nF1jDvvkxuSGA==

3tlgNOzw8BBjpNOQMnc=

nOpNEJhoU0h+00S9E1YfgA==

xcvTpljkjIyEdvhp+VcGFtJC

bZxOHr5CtzY4

rOD304X0u1DN/m7cbA==

Knixl0HJyEOOiNckwk8GFtJC

S4JMDRNTUAol

Vp9wSwNZSfY7VIpX

0Nf/zlrpmpahnM+tpkYGFtJC

joXsuHiBcVp88DHEHMA7

yN8i9ppoZYHSSaqqk6NZnQ==

4UFEMfyKhSB4UovzjdabqolwhFtMH1M=

d3RiRcXCeR8wlgjEHMA7

eMUS8PSBPCe2rPg=

LCsR0X328UuSAmlf

/keifSXopayqjLt1EWQ=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6546a7ea064c3d9f64088e019d9886f58524c335.exe
    "C:\Users\Admin\AppData\Local\Temp\6546a7ea064c3d9f64088e019d9886f58524c335.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Users\Admin\AppData\Local\Temp\6546a7ea064c3d9f64088e019d9886f58524c335.exe
      "C:\Users\Admin\AppData\Local\Temp\6546a7ea064c3d9f64088e019d9886f58524c335.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2028

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/752-54-0x0000000010AB0000-0x0000000010B84000-memory.dmp

    Filesize

    848KB

  • memory/752-55-0x0000000075D01000-0x0000000075D03000-memory.dmp

    Filesize

    8KB

  • memory/752-56-0x0000000001D70000-0x0000000001D80000-memory.dmp

    Filesize

    64KB

  • memory/752-57-0x0000000001DF0000-0x0000000001DFA000-memory.dmp

    Filesize

    40KB

  • memory/752-58-0x0000000005D30000-0x0000000005DC6000-memory.dmp

    Filesize

    600KB

  • memory/752-59-0x0000000007E10000-0x0000000007E6C000-memory.dmp

    Filesize

    368KB

  • memory/2028-60-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2028-61-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2028-63-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2028-64-0x00000000004012B0-mapping.dmp

  • memory/2028-66-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2028-67-0x0000000000401000-0x000000000042F000-memory.dmp

    Filesize

    184KB

  • memory/2028-68-0x0000000000700000-0x0000000000A03000-memory.dmp

    Filesize

    3.0MB