Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2023 21:44

General

  • Target

    6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe

  • Size

    575KB

  • MD5

    d400c125c91f0da96b71a1335d5c7e9e

  • SHA1

    c5cadd640c60cc5ae5377fa8726c15f38808a131

  • SHA256

    6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7db

  • SHA512

    8d77dc100e939fd72e3036307883584af47c35298e049fbc3c92cfb94c4a782180ff0a5c5148d72e4f2e39d6208c9237f65b1f6488e5bfa31cca5c30c0ffbf2f

  • SSDEEP

    12288:nE+RIimQdL6iHOHpF2hJwy+atu6KVC94MVK4ENzZK:nE+evGOHpKavI4YEN

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

cc73

Decoy

viptop77.biz

sell-home-fast-for-cash.xyz

wjbwebsite.top

ceramic.house

anthologymotors.com

acctwiseconsulting.com

xn--bj4blri6mqqan64b.com

roguester.com

blavkimped.com

mostbet-wih8.xyz

biellacapital.com

jasonmoorehead.online

wolrdtenis.com

huahuiblog.com

jonniprince.com

gohanyo.com

l4-j2.pro

coinyeard.com

fh8019.com

iltorlonia.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe
    "C:\Users\Admin\AppData\Local\Temp\6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Users\Admin\AppData\Local\Temp\6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe
      "C:\Users\Admin\AppData\Local\Temp\6aeb335b3a8c4506ba69d98007266a0210930cddabc6d3fe6b6c0a28e59ae7dbexe.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3872

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/220-6-0x0000000005470000-0x0000000005488000-memory.dmp

    Filesize

    96KB

  • memory/220-0-0x0000000074B30000-0x00000000752E0000-memory.dmp

    Filesize

    7.7MB

  • memory/220-2-0x0000000005550000-0x0000000005AF4000-memory.dmp

    Filesize

    5.6MB

  • memory/220-3-0x0000000005080000-0x0000000005112000-memory.dmp

    Filesize

    584KB

  • memory/220-4-0x00000000052D0000-0x00000000052E0000-memory.dmp

    Filesize

    64KB

  • memory/220-5-0x0000000005220000-0x000000000522A000-memory.dmp

    Filesize

    40KB

  • memory/220-1-0x0000000000600000-0x0000000000696000-memory.dmp

    Filesize

    600KB

  • memory/220-7-0x00000000054F0000-0x00000000054F6000-memory.dmp

    Filesize

    24KB

  • memory/220-10-0x000000000B110000-0x000000000B1AC000-memory.dmp

    Filesize

    624KB

  • memory/220-9-0x0000000006630000-0x000000000669E000-memory.dmp

    Filesize

    440KB

  • memory/220-8-0x00000000028E0000-0x00000000028EA000-memory.dmp

    Filesize

    40KB

  • memory/220-13-0x0000000074B30000-0x00000000752E0000-memory.dmp

    Filesize

    7.7MB

  • memory/3872-11-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3872-14-0x0000000000F30000-0x000000000127A000-memory.dmp

    Filesize

    3.3MB