Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 12:09

General

  • Target

    Sipariş 5035.exe

  • Size

    330KB

  • MD5

    38b08db0e93a868942dbdbf2d48fca7e

  • SHA1

    2c70b7fed8ac61f0457dc7a0b16d16d240e4cf93

  • SHA256

    ec45ebce734d9a8be961529c08e9de4b192ffd26ea3c2fb76aaf2a1b61e01146

  • SHA512

    c8c6c45b80f801ae64195ae259df498367ac576ed369fd85620fad8af0f1ff09cf09ba0efb433bf65d105b25a2a2052bf4925c7a5d36ea9536a8dd97513995ed

  • SSDEEP

    6144:/Ya6Ci59VF5Ch4HhaOtcRVEUvvYtmE9QmROYXJQN+sQIB9GvCjvta:/Yci59VLCZOtaVTSmXGrJQNYMUC0

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

k13s

Decoy

runbe.fun

factrip.com

zalenterprises.net

yoyufoods.com

soniakmahajan.com

jdfdht.site

provenimpact.net

hotelsmadridairport.com

avondalemclarenparts.com

champagnepelissot.com

dqnshtvn.click

barbarahensonrealestate.com

jrys117.top

amb168g.pro

zionsystem.live

highcaliberhusbands.com

dsc-marketing.com

outlemax.com

legalloanmaster.com

sky71.link

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3140
    • C:\Users\Admin\AppData\Local\Temp\Sipariş 5035.exe
      "C:\Users\Admin\AppData\Local\Temp\Sipariş 5035.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4472
      • C:\Users\Admin\AppData\Local\Temp\vbodsrt.exe
        "C:\Users\Admin\AppData\Local\Temp\vbodsrt.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:212
        • C:\Users\Admin\AppData\Local\Temp\vbodsrt.exe
          "C:\Users\Admin\AppData\Local\Temp\vbodsrt.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1948
    • C:\Windows\SysWOW64\systray.exe
      "C:\Windows\SysWOW64\systray.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\vbodsrt.exe"
        3⤵
          PID:4980

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\vbodsrt.exe

      Filesize

      200KB

      MD5

      3f786b0d2f21107af973f697b39a7e59

      SHA1

      521b8ddcd797c3e974b8ac49a67c81d85392a073

      SHA256

      569df557a601fa02df73b3a69b295e947596d1b26618dc9d8ff741aba924edc0

      SHA512

      6fdc5b2dce57f850fc3f3a65b6f013dbaa52104e9510d06f21603c6595b6f3ef443697b7e4f513fdc56bf4aeea676edaecb555ca253544d830ece4e40e75bdef

    • C:\Users\Admin\AppData\Local\Temp\vbodsrt.exe

      Filesize

      200KB

      MD5

      3f786b0d2f21107af973f697b39a7e59

      SHA1

      521b8ddcd797c3e974b8ac49a67c81d85392a073

      SHA256

      569df557a601fa02df73b3a69b295e947596d1b26618dc9d8ff741aba924edc0

      SHA512

      6fdc5b2dce57f850fc3f3a65b6f013dbaa52104e9510d06f21603c6595b6f3ef443697b7e4f513fdc56bf4aeea676edaecb555ca253544d830ece4e40e75bdef

    • C:\Users\Admin\AppData\Local\Temp\vbodsrt.exe

      Filesize

      200KB

      MD5

      3f786b0d2f21107af973f697b39a7e59

      SHA1

      521b8ddcd797c3e974b8ac49a67c81d85392a073

      SHA256

      569df557a601fa02df73b3a69b295e947596d1b26618dc9d8ff741aba924edc0

      SHA512

      6fdc5b2dce57f850fc3f3a65b6f013dbaa52104e9510d06f21603c6595b6f3ef443697b7e4f513fdc56bf4aeea676edaecb555ca253544d830ece4e40e75bdef

    • C:\Users\Admin\AppData\Local\Temp\wesszt.xy

      Filesize

      205KB

      MD5

      a6b70a629698511a6082803ed08bd255

      SHA1

      ae0c3fda105acac403cc28f314b27d68457b8e74

      SHA256

      6ab782e8d66d5611a65fbccbfda1b385247e45409ee5ac4bb018265ef75867d4

      SHA512

      6eeec865450d576068ba99b681345914ee42d9ea514d9521f6801062d4e452b36dc03606ac390303b94bd1187aa6846bb88a963c7d0042c97c9db7a60f9df649

    • memory/212-5-0x0000000002710000-0x0000000002712000-memory.dmp

      Filesize

      8KB

    • memory/1948-7-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1948-10-0x0000000000EE0000-0x000000000122A000-memory.dmp

      Filesize

      3.3MB

    • memory/1948-12-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1948-13-0x0000000000950000-0x0000000000964000-memory.dmp

      Filesize

      80KB

    • memory/3140-20-0x0000000008550000-0x0000000008663000-memory.dmp

      Filesize

      1.1MB

    • memory/3140-14-0x0000000008550000-0x0000000008663000-memory.dmp

      Filesize

      1.1MB

    • memory/3140-23-0x00000000088D0000-0x0000000008A02000-memory.dmp

      Filesize

      1.2MB

    • memory/3140-24-0x00000000088D0000-0x0000000008A02000-memory.dmp

      Filesize

      1.2MB

    • memory/3140-26-0x00000000088D0000-0x0000000008A02000-memory.dmp

      Filesize

      1.2MB

    • memory/4248-15-0x0000000000C20000-0x0000000000C26000-memory.dmp

      Filesize

      24KB

    • memory/4248-16-0x0000000000C20000-0x0000000000C26000-memory.dmp

      Filesize

      24KB

    • memory/4248-17-0x0000000000740000-0x000000000076F000-memory.dmp

      Filesize

      188KB

    • memory/4248-18-0x0000000002910000-0x0000000002C5A000-memory.dmp

      Filesize

      3.3MB

    • memory/4248-19-0x0000000000740000-0x000000000076F000-memory.dmp

      Filesize

      188KB

    • memory/4248-22-0x0000000002670000-0x0000000002703000-memory.dmp

      Filesize

      588KB