Analysis

  • max time kernel
    28s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2023 13:20

General

  • Target

    238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe

  • Size

    238KB

  • MD5

    8ec5b6656574a65d6f57b1f27decd161

  • SHA1

    6cfb91be22a7c684e04cdc3e4e36f3c43c7e702f

  • SHA256

    238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458

  • SHA512

    b0848c25c587590b47349faef70e48f64995fbe566bcd55bf360181193bc04f5af5d18a1bfd85f01c7d3b01c6d69f11b4d2b8f21bd6fcaf5cbc82a2b5112f933

  • SSDEEP

    6144:PYa6VVMUOy1kznVL5hQg0KLB2GkjRLL7w6rdv+:PYfmukbVLH70KMJjRbw6rdv+

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

da23

Decoy

jiuse896.com

htdingguanji.com

gbwnxhdxaudxi.com

stakoov.com

tuttu517.com

shubaerc.com

bytxon.xyz

9ihoa7.com

pacificpanacea.com

hubawatch.com

hei0obbq8sp9te.xyz

19xqe6.cfd

anagecre.com

fwradi.online

45188.icu

institutdelama.com

picateers.pro

ewmsty.site

yamaharigs.com

jistream.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe
    "C:\Users\Admin\AppData\Local\Temp\238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Users\Admin\AppData\Local\Temp\238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe
      "C:\Users\Admin\AppData\Local\Temp\238864be2d731bc5838b95c8bb50b961d19f04b6b64d3daf323db967266fa458.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2992

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nso18A2.tmp\xnkkwcvzv.dll

    Filesize

    10KB

    MD5

    76c9bc90fe94ed2de99af273900404dc

    SHA1

    8e23684dbe55183c6916f1533ff1870c85d6fdeb

    SHA256

    4e2bb7ba85a7232e9d9e1e0918e0e0a2f919a4e184fa18f61e312830070728ae

    SHA512

    1acd615bb5948c27e52ecc855f9a7ec32d84f2d6411a8e036f4570d289fa9baf377d503fe81098172f074d70d1b852413261239b1ca03a04a8778c6867a95ae6

  • memory/2992-62-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2992-65-0x0000000000830000-0x0000000000B33000-memory.dmp

    Filesize

    3.0MB