Analysis

  • max time kernel
    152s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 22:21

General

  • Target

    ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe

  • Size

    970KB

  • MD5

    661c72c6ea35739a807366da34d0052f

  • SHA1

    3eea434063b29bd161c875d4ab22ac9983c7bf6e

  • SHA256

    ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3

  • SHA512

    185cc33cbcb52f3dfa5029631d2fef28fd3133c115fdb9d239ead22822ca8ef5066614a405d1c079e770d55acbe2e9da70c95fb5f4f03bc75a9ebd61c4da7e67

  • SSDEEP

    12288:Hh1Lk70TnvjcXn4GJmWvNgczUjmYYSHIFHpCLE+8MbElL3JWl8CnpOOXA:Tk70TrcX4zWvNPURNIFIEWbqYpO

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

bz24

Decoy

paltran.com

convadesolutions.com

smyx9b.work

friggerio.com

jndyfjc.com

dm4im2q2.top

adamloweforpresident2020.com

grvtyindustries.com

lovelycacau.com

seqizi.net

xisl88.com

dateknightdelivered.com

celebsmoaic.online

patriciolawnlandscapellc.com

liqq.asia

solutions4educators.com

hybridrate.com

newseza.com

enfejbaz9jdfthea.click

bergstromchevymadison.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3208
    • C:\Users\Admin\AppData\Local\Temp\ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe
      "C:\Users\Admin\AppData\Local\Temp\ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4888
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
        3⤵
          PID:3956
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
          3⤵
            PID:796
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:3752
        • C:\Windows\SysWOW64\WWAHost.exe
          "C:\Windows\SysWOW64\WWAHost.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3656
          • C:\Windows\SysWOW64\cmd.exe
            /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
            3⤵
              PID:4808
            • C:\Program Files\Mozilla Firefox\Firefox.exe
              "C:\Program Files\Mozilla Firefox\Firefox.exe"
              3⤵
                PID:4896

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\DB1

            Filesize

            46KB

            MD5

            02d2c46697e3714e49f46b680b9a6b83

            SHA1

            84f98b56d49f01e9b6b76a4e21accf64fd319140

            SHA256

            522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

            SHA512

            60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

          • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogim.jpeg

            Filesize

            82KB

            MD5

            a3b67df422cb128e10ad34f84c2328ad

            SHA1

            e2c80aceb7ef46b26af4a25641f8bb066be5d354

            SHA256

            a382cc92de46c93260052b6f482931b9495d854f954cfe6d5f61b40072a913a6

            SHA512

            5d08c3c5f89dc41123813e8a88f1b7455ecba30f19dc534053cdd5a19a1ab5df1101d4162404d00f95b7ea7dcfa0f2c62ddfe2e20001dff3a3efca0a24642c94

          • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogrf.ini

            Filesize

            40B

            MD5

            2f245469795b865bdd1b956c23d7893d

            SHA1

            6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

            SHA256

            1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

            SHA512

            909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

          • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogrg.ini

            Filesize

            38B

            MD5

            4aadf49fed30e4c9b3fe4a3dd6445ebe

            SHA1

            1e332822167c6f351b99615eada2c30a538ff037

            SHA256

            75034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56

            SHA512

            eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945

          • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogri.ini

            Filesize

            40B

            MD5

            d63a82e5d81e02e399090af26db0b9cb

            SHA1

            91d0014c8f54743bba141fd60c9d963f869d76c9

            SHA256

            eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

            SHA512

            38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

          • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogrv.ini

            Filesize

            872B

            MD5

            bbc41c78bae6c71e63cb544a6a284d94

            SHA1

            33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a

            SHA256

            ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb

            SHA512

            0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

          • memory/3208-16-0x00000000094B0000-0x0000000009654000-memory.dmp

            Filesize

            1.6MB

          • memory/3208-24-0x00000000094B0000-0x0000000009654000-memory.dmp

            Filesize

            1.6MB

          • memory/3208-46-0x0000000008540000-0x00000000086AE000-memory.dmp

            Filesize

            1.4MB

          • memory/3208-45-0x0000000008540000-0x00000000086AE000-memory.dmp

            Filesize

            1.4MB

          • memory/3208-43-0x0000000008540000-0x00000000086AE000-memory.dmp

            Filesize

            1.4MB

          • memory/3656-22-0x0000000000500000-0x000000000052F000-memory.dmp

            Filesize

            188KB

          • memory/3656-20-0x0000000000500000-0x000000000052F000-memory.dmp

            Filesize

            188KB

          • memory/3656-42-0x0000000001400000-0x0000000001494000-memory.dmp

            Filesize

            592KB

          • memory/3656-21-0x0000000001830000-0x0000000001B7A000-memory.dmp

            Filesize

            3.3MB

          • memory/3656-17-0x0000000000010000-0x00000000000EC000-memory.dmp

            Filesize

            880KB

          • memory/3656-19-0x0000000000010000-0x00000000000EC000-memory.dmp

            Filesize

            880KB

          • memory/3752-12-0x0000000001580000-0x00000000018CA000-memory.dmp

            Filesize

            3.3MB

          • memory/3752-15-0x0000000000F70000-0x0000000000F85000-memory.dmp

            Filesize

            84KB

          • memory/3752-9-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/3752-14-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4888-6-0x0000000005670000-0x0000000005726000-memory.dmp

            Filesize

            728KB

          • memory/4888-0-0x0000000074EB0000-0x0000000075660000-memory.dmp

            Filesize

            7.7MB

          • memory/4888-11-0x0000000074EB0000-0x0000000075660000-memory.dmp

            Filesize

            7.7MB

          • memory/4888-7-0x0000000004CD0000-0x0000000004CDA000-memory.dmp

            Filesize

            40KB

          • memory/4888-8-0x0000000004D00000-0x0000000004D10000-memory.dmp

            Filesize

            64KB

          • memory/4888-5-0x00000000050C0000-0x0000000005664000-memory.dmp

            Filesize

            5.6MB

          • memory/4888-4-0x0000000004D00000-0x0000000004D10000-memory.dmp

            Filesize

            64KB

          • memory/4888-2-0x0000000004D00000-0x0000000004D10000-memory.dmp

            Filesize

            64KB

          • memory/4888-3-0x0000000004FD0000-0x0000000005086000-memory.dmp

            Filesize

            728KB

          • memory/4888-1-0x0000000074EB0000-0x0000000075660000-memory.dmp

            Filesize

            7.7MB