Analysis

  • max time kernel
    150s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 11:38

General

  • Target

    6b5c6aefc470e66a1d12bc56437f48a0.exe

  • Size

    607KB

  • MD5

    6b5c6aefc470e66a1d12bc56437f48a0

  • SHA1

    e5c903c9a731c3abfbdb5141d926616bf7b54beb

  • SHA256

    35a2017af959b6e43cb129fc6c18c7e21bc0a1d850b1e74101bbb95d8c5bd3c0

  • SHA512

    704503ceaef70125d52e42cc75cf5dad0c05e27564ed67aef5605ade8cce461100c37598c1c798ea7d39e2f6635ca7c1cd9d7f76725d749769b2c5d414c7c34b

  • SSDEEP

    12288:JtOsBgo0q4wMtAoUL2J5ANhBPTtqmYojYgRULYyo6SA:JtOsBgo0q4wMYhxBqmqgRULYyZ

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

mjf5

Decoy

scxmarine.com

4week-keto-results.com

alllivesmattertojesus.info

stoxets.com

psm-gen.com

u2collect.com

steveandgail.com

dgemediagroup.com

ragsxghi.com

hirobasushinv.com

fcvlamingo.com

thebrownseaproject.com

achalaproductions.com

unstoppableinvesting.com

epay12303.com

polenmoda.com

pgpitagi.com

picksfacts.com

allhubph.com

negociandocomvocebr.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b5c6aefc470e66a1d12bc56437f48a0.exe
    "C:\Users\Admin\AppData\Local\Temp\6b5c6aefc470e66a1d12bc56437f48a0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4720
    • C:\Users\Admin\AppData\Local\Temp\6b5c6aefc470e66a1d12bc56437f48a0.exe
      "C:\Users\Admin\AppData\Local\Temp\6b5c6aefc470e66a1d12bc56437f48a0.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1176
    • C:\Users\Admin\AppData\Local\Temp\6b5c6aefc470e66a1d12bc56437f48a0.exe
      "C:\Users\Admin\AppData\Local\Temp\6b5c6aefc470e66a1d12bc56437f48a0.exe"
      2⤵
        PID:1808

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1176-12-0x0000000000400000-0x000000000042E000-memory.dmp

            Filesize

            184KB

          • memory/1176-15-0x0000000001320000-0x000000000166A000-memory.dmp

            Filesize

            3.3MB

          • memory/4720-6-0x00000000055E0000-0x00000000055EA000-memory.dmp

            Filesize

            40KB

          • memory/4720-3-0x0000000005520000-0x00000000055B2000-memory.dmp

            Filesize

            584KB

          • memory/4720-4-0x0000000005660000-0x00000000056FC000-memory.dmp

            Filesize

            624KB

          • memory/4720-5-0x00000000057E0000-0x00000000057F0000-memory.dmp

            Filesize

            64KB

          • memory/4720-0-0x00000000746B0000-0x0000000074E60000-memory.dmp

            Filesize

            7.7MB

          • memory/4720-7-0x0000000004F00000-0x0000000004F12000-memory.dmp

            Filesize

            72KB

          • memory/4720-8-0x00000000746B0000-0x0000000074E60000-memory.dmp

            Filesize

            7.7MB

          • memory/4720-9-0x00000000057E0000-0x00000000057F0000-memory.dmp

            Filesize

            64KB

          • memory/4720-10-0x0000000007180000-0x0000000007202000-memory.dmp

            Filesize

            520KB

          • memory/4720-11-0x0000000007200000-0x000000000723A000-memory.dmp

            Filesize

            232KB

          • memory/4720-2-0x00000000059F0000-0x0000000005F94000-memory.dmp

            Filesize

            5.6MB

          • memory/4720-14-0x00000000746B0000-0x0000000074E60000-memory.dmp

            Filesize

            7.7MB

          • memory/4720-1-0x0000000000AB0000-0x0000000000B4E000-memory.dmp

            Filesize

            632KB