Analysis

  • max time kernel
    137s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2023, 09:58

General

  • Target

    28c3fe7155927cb7482afbe59c25193a1a34856caa296cec11f9a3404df33d7c.exe

  • Size

    656KB

  • MD5

    d3301e432e44d8714c204e76d4ae1dd7

  • SHA1

    5d27d9ab29f9bc918b3a0c6ff6e395f074f2f853

  • SHA256

    28c3fe7155927cb7482afbe59c25193a1a34856caa296cec11f9a3404df33d7c

  • SHA512

    259c3d3eb7e675f2c05174f64266fb951c292b5196b43959caccdd2af44ec5e6c1fbb3cd832371c3870db65d71688848d57aee67fcae9b5745a43c8cb5254e62

  • SSDEEP

    12288:ZtZ4s9CcqGzKXjogFrxgpNAf7L7cGR3YA8FMHrsoO0GLpbhegQVt:ZtZ43cd+XEO6G7LQGnRHrsd0Q1

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

btrd

Decoy

toulouse.gold

launchyouglobal.com

margarita-services.com

dasnail.club

casa-hilo.com

hardscapesofflorida.com

thepositivitypulse.com

kkmyanev.cfd

love6ace22.top

castorcruise.com

chch6.com

h59f07jy.cfd

saatvikteerthyatra.com

fxsecuretrading-option.com

mostbet-k1o.click

36-m.beauty

ko-or-a-news.com

eurekatextile.com

gynlkj.com

deepsouthcraftsman.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28c3fe7155927cb7482afbe59c25193a1a34856caa296cec11f9a3404df33d7c.exe
    "C:\Users\Admin\AppData\Local\Temp\28c3fe7155927cb7482afbe59c25193a1a34856caa296cec11f9a3404df33d7c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4896
    • C:\Users\Admin\AppData\Local\Temp\28c3fe7155927cb7482afbe59c25193a1a34856caa296cec11f9a3404df33d7c.exe
      "C:\Users\Admin\AppData\Local\Temp\28c3fe7155927cb7482afbe59c25193a1a34856caa296cec11f9a3404df33d7c.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4104

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4104-140-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4104-142-0x0000000001510000-0x000000000185A000-memory.dmp

          Filesize

          3.3MB

        • memory/4896-133-0x0000000000850000-0x00000000008FA000-memory.dmp

          Filesize

          680KB

        • memory/4896-134-0x00000000058D0000-0x0000000005E74000-memory.dmp

          Filesize

          5.6MB

        • memory/4896-135-0x0000000005320000-0x00000000053B2000-memory.dmp

          Filesize

          584KB

        • memory/4896-136-0x00000000052B0000-0x00000000052BA000-memory.dmp

          Filesize

          40KB

        • memory/4896-137-0x00000000052D0000-0x00000000052E0000-memory.dmp

          Filesize

          64KB

        • memory/4896-138-0x00000000052D0000-0x00000000052E0000-memory.dmp

          Filesize

          64KB

        • memory/4896-139-0x000000000ABB0000-0x000000000AC4C000-memory.dmp

          Filesize

          624KB