Analysis

  • max time kernel
    151s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 22:21

General

  • Target

    ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe

  • Size

    970KB

  • MD5

    661c72c6ea35739a807366da34d0052f

  • SHA1

    3eea434063b29bd161c875d4ab22ac9983c7bf6e

  • SHA256

    ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3

  • SHA512

    185cc33cbcb52f3dfa5029631d2fef28fd3133c115fdb9d239ead22822ca8ef5066614a405d1c079e770d55acbe2e9da70c95fb5f4f03bc75a9ebd61c4da7e67

  • SSDEEP

    12288:Hh1Lk70TnvjcXn4GJmWvNgczUjmYYSHIFHpCLE+8MbElL3JWl8CnpOOXA:Tk70TrcX4zWvNPURNIFIEWbqYpO

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

bz24

Decoy

paltran.com

convadesolutions.com

smyx9b.work

friggerio.com

jndyfjc.com

dm4im2q2.top

adamloweforpresident2020.com

grvtyindustries.com

lovelycacau.com

seqizi.net

xisl88.com

dateknightdelivered.com

celebsmoaic.online

patriciolawnlandscapellc.com

liqq.asia

solutions4educators.com

hybridrate.com

newseza.com

enfejbaz9jdfthea.click

bergstromchevymadison.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:2076
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:2668

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogim.jpeg

            Filesize

            71KB

            MD5

            3f1728163c21f0554a51536899138820

            SHA1

            a5cfdf66f994402588492d4b223e793734ba88d7

            SHA256

            c403e83c9b8270cc280d81e4c8585e94007850512870b886db32da8fc182e5a0

            SHA512

            91ab0fde522d0496e11095b97a195a8f4ccee1603c4cf2b20b87c617d5c10b277cd409dc85e7c6c3e680d63636c89dd88dd77ef4959c2f0d5c77ffcff5547ec9

          • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogrf.ini

            Filesize

            40B

            MD5

            2f245469795b865bdd1b956c23d7893d

            SHA1

            6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

            SHA256

            1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

            SHA512

            909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

          • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogri.ini

            Filesize

            40B

            MD5

            d63a82e5d81e02e399090af26db0b9cb

            SHA1

            91d0014c8f54743bba141fd60c9d963f869d76c9

            SHA256

            eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

            SHA512

            38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

          • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogrv.ini

            Filesize

            40B

            MD5

            ba3b6bc807d4f76794c4b81b09bb9ba5

            SHA1

            24cb89501f0212ff3095ecc0aba97dd563718fb1

            SHA256

            6eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507

            SHA512

            ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf

          • memory/1240-25-0x0000000000010000-0x0000000000020000-memory.dmp

            Filesize

            64KB

          • memory/1240-41-0x0000000006BD0000-0x0000000006CD8000-memory.dmp

            Filesize

            1.0MB

          • memory/1240-39-0x0000000006BD0000-0x0000000006CD8000-memory.dmp

            Filesize

            1.0MB

          • memory/1240-38-0x0000000006BD0000-0x0000000006CD8000-memory.dmp

            Filesize

            1.0MB

          • memory/1240-35-0x0000000003D10000-0x0000000003E5F000-memory.dmp

            Filesize

            1.3MB

          • memory/1240-26-0x0000000003D10000-0x0000000003E5F000-memory.dmp

            Filesize

            1.3MB

          • memory/1240-21-0x0000000006240000-0x00000000063DD000-memory.dmp

            Filesize

            1.6MB

          • memory/2076-12-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2076-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2076-15-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2076-10-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2076-17-0x0000000000AA0000-0x0000000000DA3000-memory.dmp

            Filesize

            3.0MB

          • memory/2076-19-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2076-20-0x0000000000140000-0x0000000000155000-memory.dmp

            Filesize

            84KB

          • memory/2076-24-0x00000000001F0000-0x0000000000205000-memory.dmp

            Filesize

            84KB

          • memory/2076-23-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2488-31-0x0000000000080000-0x00000000000AF000-memory.dmp

            Filesize

            188KB

          • memory/2488-37-0x0000000000A30000-0x0000000000AC4000-memory.dmp

            Filesize

            592KB

          • memory/2488-30-0x0000000002380000-0x0000000002683000-memory.dmp

            Filesize

            3.0MB

          • memory/2488-27-0x0000000000F70000-0x0000000000F77000-memory.dmp

            Filesize

            28KB

          • memory/2488-28-0x0000000000F70000-0x0000000000F77000-memory.dmp

            Filesize

            28KB

          • memory/2488-29-0x0000000000080000-0x00000000000AF000-memory.dmp

            Filesize

            188KB

          • memory/2992-9-0x00000000020F0000-0x00000000020FA000-memory.dmp

            Filesize

            40KB

          • memory/2992-0-0x0000000074150000-0x000000007483E000-memory.dmp

            Filesize

            6.9MB

          • memory/2992-8-0x0000000002390000-0x00000000023D0000-memory.dmp

            Filesize

            256KB

          • memory/2992-16-0x0000000074150000-0x000000007483E000-memory.dmp

            Filesize

            6.9MB

          • memory/2992-7-0x0000000002390000-0x00000000023D0000-memory.dmp

            Filesize

            256KB

          • memory/2992-6-0x0000000002390000-0x00000000023D0000-memory.dmp

            Filesize

            256KB

          • memory/2992-5-0x0000000074150000-0x000000007483E000-memory.dmp

            Filesize

            6.9MB

          • memory/2992-4-0x00000000049C0000-0x0000000004A76000-memory.dmp

            Filesize

            728KB

          • memory/2992-3-0x0000000002390000-0x00000000023D0000-memory.dmp

            Filesize

            256KB

          • memory/2992-2-0x0000000004A70000-0x0000000004B26000-memory.dmp

            Filesize

            728KB

          • memory/2992-1-0x0000000002390000-0x00000000023D0000-memory.dmp

            Filesize

            256KB