Analysis

  • max time kernel
    152s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 20:54

General

  • Target

    03be8348a96b6dfd7f9e2e9cf774158a.exe

  • Size

    1.3MB

  • MD5

    03be8348a96b6dfd7f9e2e9cf774158a

  • SHA1

    36001e5d587b70f594a38c0d45bb9e17d210f697

  • SHA256

    5aac852c4f4d5626dae1b8412fc965cc50e349389cadfd512b0f641dbef21b93

  • SHA512

    b11fcf14a4e9b31397156c509afcb9f28c307a6de89e640c574d5848c14e2e46de7fd7c516e558e991b2ded125f4e80171a49e359d7ddfe5bcbffe00319582db

  • SSDEEP

    24576:4fOsBgo0q4wMXBmCmTOUd+L6k1XWaIboHqPU7JFFaBczogDdK:4WoHMRmCm6Ud+z1X3YoHqs7JFQcLd

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

u6ep

Decoy

kristinaandmatt2021.com

ankergreen.com

portaldoinvocador.com

artisticdancecompanyct.com

clarkson-craik-wedding.com

ourparentsaspartners.net

insuranceservicesfl.com

erxia29.com

thelogicsticks.com

silversteel-ye.com

risingstrenghtscounseling.com

psm-gen.com

katsworlds.com

manayi-matnayen.com

itsgrind30.com

punebites.com

dwkjkvsa.icu

gallucciowineries.com

rogerzhou.com

teamwork256.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03be8348a96b6dfd7f9e2e9cf774158a.exe
    "C:\Users\Admin\AppData\Local\Temp\03be8348a96b6dfd7f9e2e9cf774158a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3684
    • C:\Users\Admin\AppData\Local\Temp\03be8348a96b6dfd7f9e2e9cf774158a.exe
      "C:\Users\Admin\AppData\Local\Temp\03be8348a96b6dfd7f9e2e9cf774158a.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4432

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3684-8-0x0000000005970000-0x0000000005982000-memory.dmp

          Filesize

          72KB

        • memory/3684-9-0x0000000074DB0000-0x0000000075560000-memory.dmp

          Filesize

          7.7MB

        • memory/3684-2-0x00000000052B0000-0x000000000534C000-memory.dmp

          Filesize

          624KB

        • memory/3684-3-0x0000000005980000-0x0000000005F24000-memory.dmp

          Filesize

          5.6MB

        • memory/3684-4-0x00000000053D0000-0x0000000005462000-memory.dmp

          Filesize

          584KB

        • memory/3684-5-0x00000000055F0000-0x0000000005600000-memory.dmp

          Filesize

          64KB

        • memory/3684-7-0x0000000005560000-0x00000000055B6000-memory.dmp

          Filesize

          344KB

        • memory/3684-6-0x0000000005350000-0x000000000535A000-memory.dmp

          Filesize

          40KB

        • memory/3684-1-0x0000000000770000-0x00000000008B6000-memory.dmp

          Filesize

          1.3MB

        • memory/3684-10-0x00000000055F0000-0x0000000005600000-memory.dmp

          Filesize

          64KB

        • memory/3684-0-0x0000000074DB0000-0x0000000075560000-memory.dmp

          Filesize

          7.7MB

        • memory/3684-11-0x0000000006E00000-0x0000000006E82000-memory.dmp

          Filesize

          520KB

        • memory/3684-12-0x0000000006E80000-0x0000000006EBA000-memory.dmp

          Filesize

          232KB

        • memory/3684-15-0x0000000074DB0000-0x0000000075560000-memory.dmp

          Filesize

          7.7MB

        • memory/4432-13-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/4432-16-0x00000000016A0000-0x00000000019EA000-memory.dmp

          Filesize

          3.3MB

        • memory/4432-17-0x00000000016A0000-0x00000000019EA000-memory.dmp

          Filesize

          3.3MB