Analysis

  • max time kernel
    162s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    15-11-2023 15:50

General

  • Target

    NEAS.a3e4cc3747006495c9cae3e6f08010b8368ebd5883b556e021a923fc20f5bef1.exe

  • Size

    342KB

  • MD5

    7690ad629325aa8d720749249c0142f4

  • SHA1

    a532fdc6b1786805e0e9e12d97fc8c2640b14f96

  • SHA256

    a3e4cc3747006495c9cae3e6f08010b8368ebd5883b556e021a923fc20f5bef1

  • SHA512

    5f3c19f0efbbb18509ba1fb965d8983c9b113716992736b394db1ca33169cf1175a97a71a736dd1a27172105ec169968d53712ce6fffdc65f5e98b5f8f28bfad

  • SSDEEP

    6144:wBlL/91vk5jzmx31SGUCpkWbeZnarzgbm8q/vx2P3U095WAD:C/t3AGUCpvbeZNjup2P3Uqd

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

st58

Decoy

ariaspuccini.coach

ailebasvurulari.xyz

apexconsys.com

paymentnland.com

anniestannie.net

airdriechristianyouthgroup.com

vibezclothings.com

ariellabrock.autos

gloverconsulting.online

cc66007d.com

d55hnw.top

larrydeviney.com

zbhhzs.com

salarapk.com

llamalister.com

bzykaj.com

camloi.xyz

vitalidadenaturalebemestar.com

thefitmove.com

abbyamuwo.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\NEAS.a3e4cc3747006495c9cae3e6f08010b8368ebd5883b556e021a923fc20f5bef1.exe
      "C:\Users\Admin\AppData\Local\Temp\NEAS.a3e4cc3747006495c9cae3e6f08010b8368ebd5883b556e021a923fc20f5bef1.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2928
      • C:\Users\Admin\AppData\Local\Temp\qfjdfitcha.exe
        "C:\Users\Admin\AppData\Local\Temp\qfjdfitcha.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Users\Admin\AppData\Local\Temp\qfjdfitcha.exe
          "C:\Users\Admin\AppData\Local\Temp\qfjdfitcha.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:3048
    • C:\Windows\SysWOW64\cscript.exe
      "C:\Windows\SysWOW64\cscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\qfjdfitcha.exe"
        3⤵
          PID:2876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\qfjdfitcha.exe

      Filesize

      259KB

      MD5

      39e17565045950f25bbde9d80cdd4bc4

      SHA1

      ce99fe81136cef1b0bac000a75408a79ba4e33e8

      SHA256

      18d31533e303abf8ed0d8e535b24b2afbf3d7e5db8b02ab1e5dff918fdf12073

      SHA512

      c16360490fed614279703c81087071208373c392c7ded1513c4ba6144eb2e2047e20636d72797022ad3a628cc28b28a8b6ebd71df7d13ef86bceeeabd93d9eb2

    • C:\Users\Admin\AppData\Local\Temp\qfjdfitcha.exe

      Filesize

      259KB

      MD5

      39e17565045950f25bbde9d80cdd4bc4

      SHA1

      ce99fe81136cef1b0bac000a75408a79ba4e33e8

      SHA256

      18d31533e303abf8ed0d8e535b24b2afbf3d7e5db8b02ab1e5dff918fdf12073

      SHA512

      c16360490fed614279703c81087071208373c392c7ded1513c4ba6144eb2e2047e20636d72797022ad3a628cc28b28a8b6ebd71df7d13ef86bceeeabd93d9eb2

    • C:\Users\Admin\AppData\Local\Temp\qfjdfitcha.exe

      Filesize

      259KB

      MD5

      39e17565045950f25bbde9d80cdd4bc4

      SHA1

      ce99fe81136cef1b0bac000a75408a79ba4e33e8

      SHA256

      18d31533e303abf8ed0d8e535b24b2afbf3d7e5db8b02ab1e5dff918fdf12073

      SHA512

      c16360490fed614279703c81087071208373c392c7ded1513c4ba6144eb2e2047e20636d72797022ad3a628cc28b28a8b6ebd71df7d13ef86bceeeabd93d9eb2

    • C:\Users\Admin\AppData\Local\Temp\qfjdfitcha.exe

      Filesize

      259KB

      MD5

      39e17565045950f25bbde9d80cdd4bc4

      SHA1

      ce99fe81136cef1b0bac000a75408a79ba4e33e8

      SHA256

      18d31533e303abf8ed0d8e535b24b2afbf3d7e5db8b02ab1e5dff918fdf12073

      SHA512

      c16360490fed614279703c81087071208373c392c7ded1513c4ba6144eb2e2047e20636d72797022ad3a628cc28b28a8b6ebd71df7d13ef86bceeeabd93d9eb2

    • C:\Users\Admin\AppData\Local\Temp\qsptoep.zeo

      Filesize

      205KB

      MD5

      2a840fdb50cc364459c4bf33806d9350

      SHA1

      78c87301fcb8a4276b7aa8517e2e35824b589a21

      SHA256

      1b09322ebd6b1d897ae0b262cf6760af2ab27df8dc81f8fb9d34138709f97a9e

      SHA512

      852ecc9655e36f6ed0e00ba51a919e5e2c3e3e57cbab199d04861127ee1256f9ec51947cfb97ef797ce7810f77a041af28c6b80ed25bc385fac1d77a029f3f00

    • \Users\Admin\AppData\Local\Temp\qfjdfitcha.exe

      Filesize

      259KB

      MD5

      39e17565045950f25bbde9d80cdd4bc4

      SHA1

      ce99fe81136cef1b0bac000a75408a79ba4e33e8

      SHA256

      18d31533e303abf8ed0d8e535b24b2afbf3d7e5db8b02ab1e5dff918fdf12073

      SHA512

      c16360490fed614279703c81087071208373c392c7ded1513c4ba6144eb2e2047e20636d72797022ad3a628cc28b28a8b6ebd71df7d13ef86bceeeabd93d9eb2

    • \Users\Admin\AppData\Local\Temp\qfjdfitcha.exe

      Filesize

      259KB

      MD5

      39e17565045950f25bbde9d80cdd4bc4

      SHA1

      ce99fe81136cef1b0bac000a75408a79ba4e33e8

      SHA256

      18d31533e303abf8ed0d8e535b24b2afbf3d7e5db8b02ab1e5dff918fdf12073

      SHA512

      c16360490fed614279703c81087071208373c392c7ded1513c4ba6144eb2e2047e20636d72797022ad3a628cc28b28a8b6ebd71df7d13ef86bceeeabd93d9eb2

    • \Users\Admin\AppData\Local\Temp\qfjdfitcha.exe

      Filesize

      259KB

      MD5

      39e17565045950f25bbde9d80cdd4bc4

      SHA1

      ce99fe81136cef1b0bac000a75408a79ba4e33e8

      SHA256

      18d31533e303abf8ed0d8e535b24b2afbf3d7e5db8b02ab1e5dff918fdf12073

      SHA512

      c16360490fed614279703c81087071208373c392c7ded1513c4ba6144eb2e2047e20636d72797022ad3a628cc28b28a8b6ebd71df7d13ef86bceeeabd93d9eb2

    • memory/1204-19-0x0000000006DC0000-0x0000000006EDC000-memory.dmp

      Filesize

      1.1MB

    • memory/1204-29-0x0000000000010000-0x0000000000020000-memory.dmp

      Filesize

      64KB

    • memory/1204-37-0x0000000007380000-0x00000000074A1000-memory.dmp

      Filesize

      1.1MB

    • memory/1204-34-0x000007FEF64F0000-0x000007FEF6633000-memory.dmp

      Filesize

      1.3MB

    • memory/1204-35-0x000007FEA6B10000-0x000007FEA6B1A000-memory.dmp

      Filesize

      40KB

    • memory/1204-32-0x0000000006DC0000-0x0000000006EDC000-memory.dmp

      Filesize

      1.1MB

    • memory/1204-31-0x0000000007380000-0x00000000074A1000-memory.dmp

      Filesize

      1.1MB

    • memory/1204-30-0x0000000007380000-0x00000000074A1000-memory.dmp

      Filesize

      1.1MB

    • memory/2188-9-0x00000000001D0000-0x00000000001D2000-memory.dmp

      Filesize

      8KB

    • memory/2720-25-0x0000000001F00000-0x0000000002203000-memory.dmp

      Filesize

      3.0MB

    • memory/2720-26-0x0000000000070000-0x000000000009F000-memory.dmp

      Filesize

      188KB

    • memory/2720-28-0x0000000001E60000-0x0000000001EF3000-memory.dmp

      Filesize

      588KB

    • memory/2720-24-0x0000000000070000-0x000000000009F000-memory.dmp

      Filesize

      188KB

    • memory/2720-22-0x00000000003D0000-0x00000000003F2000-memory.dmp

      Filesize

      136KB

    • memory/2720-20-0x00000000003D0000-0x00000000003F2000-memory.dmp

      Filesize

      136KB

    • memory/3048-13-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3048-18-0x00000000002B0000-0x00000000002C4000-memory.dmp

      Filesize

      80KB

    • memory/3048-17-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3048-15-0x0000000000820000-0x0000000000B23000-memory.dmp

      Filesize

      3.0MB