Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-02-2024 12:17

General

  • Target

    86de2e406f7fe5e5d5c7cefa5aa49061.exe

  • Size

    483KB

  • MD5

    86de2e406f7fe5e5d5c7cefa5aa49061

  • SHA1

    2b2949047631b7abd4c8f44b5322a28bf4deaabc

  • SHA256

    9184a3c0ca571280bd6e33bd05a9c15e7568fd2968f752b333605191e9cd87d7

  • SHA512

    ee393e974ebd757a12b27a731d2c64ff837709961bfd30bd847aef15bb795dd03c1f9e727f02ac7e712032dc4e109f9ff3d98fe6b7eb3561ea4586b395d1b68e

  • SSDEEP

    6144:QIFhuSYWFYgrKsUc3y2WnO1xzcWmZXe2rkwnbo60T21BOcCSrYDEgfje5ig1ef9+:dh8Mz+sv3y2N1xzAZprkmuN/SD5iKef4

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

ow

Decoy

piavecaffe.com

jlxkqg.men

lifesavingfoundation.net

karadasama.net

michaeltraolach-macsweeney.com

thunderwatches.com

serviciocasawhirlpool.biz

c-cap.online

itparksolution.com

clarityhearingkw.com

wpgrosiri.date

colemarshalcambell.com

webperffest.com

adjusterforirma.info

buildersqq.com

spiritualwisdominindia.com

111222333.net

traditionalarabicdishes.com

hmlifi.com

receive-our-info-heredaily.info

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86de2e406f7fe5e5d5c7cefa5aa49061.exe
    "C:\Users\Admin\AppData\Local\Temp\86de2e406f7fe5e5d5c7cefa5aa49061.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\86de2e406f7fe5e5d5c7cefa5aa49061.exe" "C:\Users\Admin\AppData\Local\syscheck.exe"
      2⤵
        PID:4860
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\syscheck.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2236
        • C:\Users\Admin\AppData\Local\syscheck.exe
          "C:\Users\Admin\AppData\Local\syscheck.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1456
          • C:\Users\Admin\AppData\Local\syscheck.exe
            "C:\Users\Admin\AppData\Local\syscheck.exe"
            4⤵
            • Executes dropped EXE
            PID:4052
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 184
              5⤵
              • Program crash
              PID:4532
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4052 -ip 4052
      1⤵
        PID:1372

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\syscheck.exe

        Filesize

        483KB

        MD5

        86de2e406f7fe5e5d5c7cefa5aa49061

        SHA1

        2b2949047631b7abd4c8f44b5322a28bf4deaabc

        SHA256

        9184a3c0ca571280bd6e33bd05a9c15e7568fd2968f752b333605191e9cd87d7

        SHA512

        ee393e974ebd757a12b27a731d2c64ff837709961bfd30bd847aef15bb795dd03c1f9e727f02ac7e712032dc4e109f9ff3d98fe6b7eb3561ea4586b395d1b68e

      • memory/1456-17-0x0000000074AD0000-0x0000000075280000-memory.dmp

        Filesize

        7.7MB

      • memory/1456-15-0x0000000074AD0000-0x0000000075280000-memory.dmp

        Filesize

        7.7MB

      • memory/1456-25-0x0000000074AD0000-0x0000000075280000-memory.dmp

        Filesize

        7.7MB

      • memory/1456-19-0x0000000006060000-0x00000000060FC000-memory.dmp

        Filesize

        624KB

      • memory/1456-18-0x0000000005370000-0x0000000005380000-memory.dmp

        Filesize

        64KB

      • memory/1456-16-0x0000000005370000-0x0000000005380000-memory.dmp

        Filesize

        64KB

      • memory/4052-22-0x0000000000780000-0x00000000007AA000-memory.dmp

        Filesize

        168KB

      • memory/4972-13-0x0000000074AD0000-0x0000000075280000-memory.dmp

        Filesize

        7.7MB

      • memory/4972-5-0x0000000004E40000-0x0000000004E50000-memory.dmp

        Filesize

        64KB

      • memory/4972-9-0x0000000004E40000-0x0000000004E50000-memory.dmp

        Filesize

        64KB

      • memory/4972-2-0x0000000005140000-0x00000000056E4000-memory.dmp

        Filesize

        5.6MB

      • memory/4972-0-0x0000000000220000-0x000000000029E000-memory.dmp

        Filesize

        504KB

      • memory/4972-8-0x0000000074AD0000-0x0000000075280000-memory.dmp

        Filesize

        7.7MB

      • memory/4972-1-0x0000000074AD0000-0x0000000075280000-memory.dmp

        Filesize

        7.7MB

      • memory/4972-4-0x0000000004D20000-0x0000000004D3C000-memory.dmp

        Filesize

        112KB

      • memory/4972-3-0x0000000004C80000-0x0000000004D12000-memory.dmp

        Filesize

        584KB