Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14-02-2024 03:35

General

  • Target

    M5q4uWVi2hHJb5C.exe

  • Size

    673KB

  • MD5

    8f59922b722f3d9687be6fbe7560a62e

  • SHA1

    8fa58ece4679a1583f3f63ad1e7584ddae114e02

  • SHA256

    2cf38bc5d5c1fea2c057ec48c472636028f113bea556386f0cc8b785a3a21189

  • SHA512

    118ed74e6d2b0377d0d32366315b3fae260d6bdc5b10b1eaad6c8747a153844a1bec55bca194411e70db71251c5324aa69a0c5133e32cb1440107c5d9afb12e9

  • SSDEEP

    12288:8CxEd61QEWfBQYahsa5cJQAmaNzzePkzYa3Y2fTKQ+KWr:8CxcvfByhsa5+OKzzhZZ7L+pr

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

cz30

Decoy

valeriepuma.com

rentyourbag.com

unglesbyessure.com

ahzmjy.site

taazdelights.online

conexoesnews.com

istprimeway.com

elwf4tlu.shop

661.support

fournaisehk.com

glechiu.xyz

2r2pv2.shop

902523.rip

bruggicapy.com

westmobileautodeatailers.online

muaad.co

gridxsens.com

victoronedesigns.com

tecexpressbr.com

crea4net.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Users\Admin\AppData\Local\Temp\M5q4uWVi2hHJb5C.exe
      "C:\Users\Admin\AppData\Local\Temp\M5q4uWVi2hHJb5C.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\M5q4uWVi2hHJb5C.exe
        "C:\Users\Admin\AppData\Local\Temp\M5q4uWVi2hHJb5C.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2792
    • C:\Windows\SysWOW64\autoconv.exe
      "C:\Windows\SysWOW64\autoconv.exe"
      2⤵
        PID:2780
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\SysWOW64\svchost.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2972
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:884

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1212-8-0x0000000004E10000-0x0000000004E50000-memory.dmp

        Filesize

        256KB

      • memory/1212-6-0x00000000011F0000-0x0000000001266000-memory.dmp

        Filesize

        472KB

      • memory/1212-2-0x0000000004E10000-0x0000000004E50000-memory.dmp

        Filesize

        256KB

      • memory/1212-3-0x00000000006D0000-0x00000000006E4000-memory.dmp

        Filesize

        80KB

      • memory/1212-0-0x0000000001280000-0x000000000132E000-memory.dmp

        Filesize

        696KB

      • memory/1212-5-0x00000000008B0000-0x00000000008BE000-memory.dmp

        Filesize

        56KB

      • memory/1212-1-0x00000000748E0000-0x0000000074FCE000-memory.dmp

        Filesize

        6.9MB

      • memory/1212-7-0x00000000748E0000-0x0000000074FCE000-memory.dmp

        Filesize

        6.9MB

      • memory/1212-4-0x00000000008A0000-0x00000000008AA000-memory.dmp

        Filesize

        40KB

      • memory/1212-14-0x00000000748E0000-0x0000000074FCE000-memory.dmp

        Filesize

        6.9MB

      • memory/1228-34-0x0000000004010000-0x0000000004106000-memory.dmp

        Filesize

        984KB

      • memory/1228-23-0x0000000000330000-0x0000000000430000-memory.dmp

        Filesize

        1024KB

      • memory/1228-25-0x00000000072A0000-0x000000000742E000-memory.dmp

        Filesize

        1.6MB

      • memory/1228-37-0x00000000072A0000-0x000000000742E000-memory.dmp

        Filesize

        1.6MB

      • memory/1228-20-0x0000000004010000-0x0000000004106000-memory.dmp

        Filesize

        984KB

      • memory/1228-19-0x00000000027D0000-0x00000000028D0000-memory.dmp

        Filesize

        1024KB

      • memory/2792-18-0x0000000000310000-0x0000000000324000-memory.dmp

        Filesize

        80KB

      • memory/2792-10-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2792-15-0x0000000000820000-0x0000000000B23000-memory.dmp

        Filesize

        3.0MB

      • memory/2792-24-0x0000000000350000-0x0000000000364000-memory.dmp

        Filesize

        80KB

      • memory/2792-13-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2792-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2792-22-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2792-17-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2792-9-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2972-26-0x0000000000310000-0x0000000000318000-memory.dmp

        Filesize

        32KB

      • memory/2972-29-0x0000000000970000-0x0000000000C73000-memory.dmp

        Filesize

        3.0MB

      • memory/2972-30-0x0000000000080000-0x00000000000AF000-memory.dmp

        Filesize

        188KB

      • memory/2972-35-0x00000000005D0000-0x0000000000663000-memory.dmp

        Filesize

        588KB

      • memory/2972-28-0x0000000000080000-0x00000000000AF000-memory.dmp

        Filesize

        188KB

      • memory/2972-27-0x0000000000310000-0x0000000000318000-memory.dmp

        Filesize

        32KB

      • memory/2972-41-0x00000000005D0000-0x0000000000663000-memory.dmp

        Filesize

        588KB