Analysis

  • max time kernel
    146s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/05/2023, 13:57

General

  • Target

    BANKDETAILS.exe

  • Size

    670KB

  • MD5

    62de26e79eac6c290961bb1afa81ba1a

  • SHA1

    77530bc0c680378aa32fb2e0270872483b9180ab

  • SHA256

    0368b2ffa6991460a59b03edcd2ef71c423a27d4902b2222248bc0935776614d

  • SHA512

    10ee542999f7fead4c4fedbb6e7345713a5e926d477149178ecb98dbc9231664416e14210bc5c0ea0f9c42ab10c5bae2a82629e5f1d22c17d9109f7e17800e5a

  • SSDEEP

    12288:LmghfidoyW343eZQjro5O6hfteIghB6sGnf9Yprmf:LmCid5g4ugwItGsGnf9Y5s

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

m82

Decoy

jamesdevereux.com

artificialturfminneapolis.com

hongmeiyan.com

lojaderoupasbr.com

yit.africa

austinrelocationexpert.com

saiva.page

exitsategy.com

chochonux.com

klosterbraeu-unterliezheim.com

byseymanur.com

sblwarwickshire.co.uk

brazimaid.com

ciogame.com

bronzesailing.com

dwkapl.xyz

022dyd.com

compassandpathwriting.com

alphabet1x.com

selfcleaninghairbrush.co.uk

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BANKDETAILS.exe
    "C:\Users\Admin\AppData\Local\Temp\BANKDETAILS.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:2584
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4576
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\SysWOW64\netsh.exe
        "C:\Windows\SysWOW64\netsh.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4768
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
            PID:4508

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/536-133-0x0000000000CF0000-0x0000000000D9C000-memory.dmp

              Filesize

              688KB

            • memory/536-134-0x0000000005D50000-0x00000000062F4000-memory.dmp

              Filesize

              5.6MB

            • memory/536-135-0x00000000057A0000-0x0000000005832000-memory.dmp

              Filesize

              584KB

            • memory/536-136-0x0000000005740000-0x000000000574A000-memory.dmp

              Filesize

              40KB

            • memory/536-137-0x00000000059D0000-0x00000000059E0000-memory.dmp

              Filesize

              64KB

            • memory/536-138-0x00000000059D0000-0x00000000059E0000-memory.dmp

              Filesize

              64KB

            • memory/536-139-0x00000000073E0000-0x000000000747C000-memory.dmp

              Filesize

              624KB

            • memory/2784-146-0x00000000089B0000-0x0000000008B46000-memory.dmp

              Filesize

              1.6MB

            • memory/2784-154-0x00000000089B0000-0x0000000008B46000-memory.dmp

              Filesize

              1.6MB

            • memory/2784-159-0x0000000008E70000-0x0000000008F0E000-memory.dmp

              Filesize

              632KB

            • memory/2784-157-0x0000000008E70000-0x0000000008F0E000-memory.dmp

              Filesize

              632KB

            • memory/2784-156-0x0000000008E70000-0x0000000008F0E000-memory.dmp

              Filesize

              632KB

            • memory/4576-144-0x0000000001040000-0x000000000138A000-memory.dmp

              Filesize

              3.3MB

            • memory/4576-143-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/4576-140-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/4576-145-0x0000000000FC0000-0x0000000000FD5000-memory.dmp

              Filesize

              84KB

            • memory/4768-147-0x00000000016E0000-0x00000000016FE000-memory.dmp

              Filesize

              120KB

            • memory/4768-150-0x0000000000D00000-0x0000000000D2F000-memory.dmp

              Filesize

              188KB

            • memory/4768-151-0x0000000001700000-0x0000000001A4A000-memory.dmp

              Filesize

              3.3MB

            • memory/4768-152-0x0000000000D00000-0x0000000000D2F000-memory.dmp

              Filesize

              188KB

            • memory/4768-149-0x00000000016E0000-0x00000000016FE000-memory.dmp

              Filesize

              120KB

            • memory/4768-155-0x00000000013E0000-0x0000000001474000-memory.dmp

              Filesize

              592KB