Analysis

  • max time kernel
    69s
  • max time network
    91s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-06-2023 10:37

General

  • Target

    57c7197e5a65dfb3079b47e524fd148c.exe

  • Size

    650KB

  • MD5

    57c7197e5a65dfb3079b47e524fd148c

  • SHA1

    433fb441b04980ba8cfa87e5b5e978c1ea2866e1

  • SHA256

    2834c7716f19153625258be49e586dc0d81be392f9bedeae1ddd740469287c44

  • SHA512

    01592b6bbd3adae1a24d47a58331e5bd7089aad78f73b04d2844677ef0ccc69f0d7de500a7c4c1af9bc613548c8f44f2885d3778cd802482583ad75b659f1785

  • SSDEEP

    12288:vpdvDhH62MmgPFsOnb89E/pnrKLwqvcYCh8OESIWS6qgJWVYtE2:xdvDcAwY99wVXhzEgU

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

xchu

Decoy

zcartoons.com

castilloshowroom.com

3bmmdtod.life

misaxoxo.com

nadiya.online

sykkbup29.xyz

triciaaprimrosevp.com

newleter.com

ptzslk.xyz

lightbulbfestival.com

texaslandline.com

ideeintemporelle.com

girljustdoitpodcast.com

medimediamarketing.com

bunk7outfitters.com

charlievgrfminnick.click

lifestyleinthehome.com

atfbestsale.online

frontdoorproperties.co.uk

grandpaswag2024.info

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57c7197e5a65dfb3079b47e524fd148c.exe
    "C:\Users\Admin\AppData\Local\Temp\57c7197e5a65dfb3079b47e524fd148c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Local\Temp\57c7197e5a65dfb3079b47e524fd148c.exe
      "C:\Users\Admin\AppData\Local\Temp\57c7197e5a65dfb3079b47e524fd148c.exe"
      2⤵
        PID:2104
      • C:\Users\Admin\AppData\Local\Temp\57c7197e5a65dfb3079b47e524fd148c.exe
        "C:\Users\Admin\AppData\Local\Temp\57c7197e5a65dfb3079b47e524fd148c.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:5096

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2568-133-0x0000000000190000-0x0000000000238000-memory.dmp
      Filesize

      672KB

    • memory/2568-134-0x0000000005050000-0x00000000055F4000-memory.dmp
      Filesize

      5.6MB

    • memory/2568-135-0x0000000004B40000-0x0000000004BD2000-memory.dmp
      Filesize

      584KB

    • memory/2568-136-0x0000000004B10000-0x0000000004B1A000-memory.dmp
      Filesize

      40KB

    • memory/2568-137-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
      Filesize

      64KB

    • memory/2568-138-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
      Filesize

      64KB

    • memory/2568-139-0x0000000006C00000-0x0000000006C9C000-memory.dmp
      Filesize

      624KB

    • memory/5096-140-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/5096-142-0x0000000001350000-0x000000000169A000-memory.dmp
      Filesize

      3.3MB