Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 05:54

General

  • Target

    2acc48ac59c4d56bd7ac05e52cf1117d.exe

  • Size

    1.1MB

  • MD5

    2acc48ac59c4d56bd7ac05e52cf1117d

  • SHA1

    ebfd27d0fd630d2212934a92ed30d66035ab16ee

  • SHA256

    741e54e8d4c95d3a939bea610b4805e417a0662e17e5811aa72466d74f0fe9b4

  • SHA512

    fcf2b00192f268fa31a071bf10306399b3450abab81899be34d89f74528c57c1507cdd52d98938d57489d664b87a2660fa3152acee36cb52428249bb7fce63a0

  • SSDEEP

    24576:6lQ7oY8FYMblhBIgzqRDPzdzN543puwbmF:wQoyA1ZqrdKjm

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

odse

Decoy

braedlifestyle.com

morganjohnsondesign.online

surup-v48.club

diypoolpaint.sydney

v-b7026-ghhh.space

vetyvar.com

lollydaisy.com

campsitesurvival.com

autocalibre.com

fusiontech3d.com

xn--udkog0cvez259c82sa.xyz

eccentricartist.com

jc-zg.com

wacwin.com

livehealthychoice.com

visijuara.com

phigsa.com

sabayawork.com

afcerd.com

joeyshousesessions.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3488
    • C:\Users\Admin\AppData\Local\Temp\2acc48ac59c4d56bd7ac05e52cf1117d.exe
      "C:\Users\Admin\AppData\Local\Temp\2acc48ac59c4d56bd7ac05e52cf1117d.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ikCLfihlU" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA9C8.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:1872
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2020
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4860
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:2828

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmpA9C8.tmp

            Filesize

            1KB

            MD5

            923651f4148c53b334f65ff72e7ade64

            SHA1

            a5a1cc3b033621f15d84690c5105bf99c7cf9c63

            SHA256

            271c4472028e3cdf7ca664cbb35c282ba31ff76843bed6537f700bf460d88788

            SHA512

            0579905a0a7a4e74b6d9537727410e565650bbd9b44ca8d57c641aadfc68c853d262fd10ee99283e1b9c7515574d0aa81a1560c4dcecfe0d0f05e1c909193cbe

          • memory/2020-24-0x00000000018E0000-0x00000000018F4000-memory.dmp

            Filesize

            80KB

          • memory/2020-23-0x0000000000400000-0x000000000042E000-memory.dmp

            Filesize

            184KB

          • memory/2020-21-0x0000000001910000-0x0000000001C5A000-memory.dmp

            Filesize

            3.3MB

          • memory/2020-18-0x0000000000400000-0x000000000042E000-memory.dmp

            Filesize

            184KB

          • memory/3488-41-0x00000000091A0000-0x0000000009300000-memory.dmp

            Filesize

            1.4MB

          • memory/3488-38-0x00000000091A0000-0x0000000009300000-memory.dmp

            Filesize

            1.4MB

          • memory/3488-36-0x00000000091A0000-0x0000000009300000-memory.dmp

            Filesize

            1.4MB

          • memory/3488-32-0x00000000088F0000-0x0000000008A48000-memory.dmp

            Filesize

            1.3MB

          • memory/3488-25-0x00000000088F0000-0x0000000008A48000-memory.dmp

            Filesize

            1.3MB

          • memory/4860-28-0x0000000000D90000-0x0000000000DA4000-memory.dmp

            Filesize

            80KB

          • memory/4860-26-0x0000000000D90000-0x0000000000DA4000-memory.dmp

            Filesize

            80KB

          • memory/4860-35-0x00000000004A0000-0x00000000004CE000-memory.dmp

            Filesize

            184KB

          • memory/4860-33-0x0000000002260000-0x00000000022F3000-memory.dmp

            Filesize

            588KB

          • memory/4860-31-0x0000000002520000-0x000000000286A000-memory.dmp

            Filesize

            3.3MB

          • memory/4860-30-0x00000000004A0000-0x00000000004CE000-memory.dmp

            Filesize

            184KB

          • memory/4972-20-0x0000000074D70000-0x0000000075520000-memory.dmp

            Filesize

            7.7MB

          • memory/4972-9-0x0000000074D70000-0x0000000075520000-memory.dmp

            Filesize

            7.7MB

          • memory/4972-6-0x0000000005600000-0x000000000560A000-memory.dmp

            Filesize

            40KB

          • memory/4972-5-0x00000000058A0000-0x00000000058B0000-memory.dmp

            Filesize

            64KB

          • memory/4972-8-0x0000000005A30000-0x0000000005A48000-memory.dmp

            Filesize

            96KB

          • memory/4972-0-0x0000000074D70000-0x0000000075520000-memory.dmp

            Filesize

            7.7MB

          • memory/4972-11-0x00000000015C0000-0x0000000001664000-memory.dmp

            Filesize

            656KB

          • memory/4972-7-0x0000000005910000-0x0000000005966000-memory.dmp

            Filesize

            344KB

          • memory/4972-4-0x0000000005710000-0x00000000057A2000-memory.dmp

            Filesize

            584KB

          • memory/4972-10-0x00000000058A0000-0x00000000058B0000-memory.dmp

            Filesize

            64KB

          • memory/4972-12-0x00000000011E0000-0x0000000001214000-memory.dmp

            Filesize

            208KB

          • memory/4972-3-0x0000000005CC0000-0x0000000006264000-memory.dmp

            Filesize

            5.6MB

          • memory/4972-2-0x0000000005670000-0x000000000570C000-memory.dmp

            Filesize

            624KB

          • memory/4972-1-0x0000000000AF0000-0x0000000000C1C000-memory.dmp

            Filesize

            1.2MB