Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2024, 03:35

General

  • Target

    M5q4uWVi2hHJb5C.exe

  • Size

    673KB

  • MD5

    8f59922b722f3d9687be6fbe7560a62e

  • SHA1

    8fa58ece4679a1583f3f63ad1e7584ddae114e02

  • SHA256

    2cf38bc5d5c1fea2c057ec48c472636028f113bea556386f0cc8b785a3a21189

  • SHA512

    118ed74e6d2b0377d0d32366315b3fae260d6bdc5b10b1eaad6c8747a153844a1bec55bca194411e70db71251c5324aa69a0c5133e32cb1440107c5d9afb12e9

  • SSDEEP

    12288:8CxEd61QEWfBQYahsa5cJQAmaNzzePkzYa3Y2fTKQ+KWr:8CxcvfByhsa5+OKzzhZZ7L+pr

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

cz30

Decoy

valeriepuma.com

rentyourbag.com

unglesbyessure.com

ahzmjy.site

taazdelights.online

conexoesnews.com

istprimeway.com

elwf4tlu.shop

661.support

fournaisehk.com

glechiu.xyz

2r2pv2.shop

902523.rip

bruggicapy.com

westmobileautodeatailers.online

muaad.co

gridxsens.com

victoronedesigns.com

tecexpressbr.com

crea4net.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Users\Admin\AppData\Local\Temp\M5q4uWVi2hHJb5C.exe
      "C:\Users\Admin\AppData\Local\Temp\M5q4uWVi2hHJb5C.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3676
      • C:\Users\Admin\AppData\Local\Temp\M5q4uWVi2hHJb5C.exe
        "C:\Users\Admin\AppData\Local\Temp\M5q4uWVi2hHJb5C.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4284
    • C:\Windows\SysWOW64\colorcpl.exe
      "C:\Windows\SysWOW64\colorcpl.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3344
      • C:\Windows\SysWOW64\cmd.exe
        /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
        3⤵
          PID:3968
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:2072

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\DB1

              Filesize

              46KB

              MD5

              02d2c46697e3714e49f46b680b9a6b83

              SHA1

              84f98b56d49f01e9b6b76a4e21accf64fd319140

              SHA256

              522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

              SHA512

              60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

            • C:\Users\Admin\AppData\Roaming\842RRO05\842logim.jpeg

              Filesize

              75KB

              MD5

              96ba05cb4e02abd61c4a4a8392e85a19

              SHA1

              d37669b5d423c02714c0299353220f10ec48ba64

              SHA256

              cb51bbf87e9f4f25ba26c32859b3f97f3ca81520a73119a8ae238672eff35442

              SHA512

              1c5eda514afea70afdcf4accd3a437b697d1a3b349b824729cea96ced586af42cff9cc1c6cd46dde8e647cbfb64873aeb3cc1577849440c84dd11a66a45ae5b1

            • C:\Users\Admin\AppData\Roaming\842RRO05\842logrf.ini

              Filesize

              40B

              MD5

              2f245469795b865bdd1b956c23d7893d

              SHA1

              6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

              SHA256

              1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

              SHA512

              909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

            • C:\Users\Admin\AppData\Roaming\842RRO05\842logrg.ini

              Filesize

              38B

              MD5

              4aadf49fed30e4c9b3fe4a3dd6445ebe

              SHA1

              1e332822167c6f351b99615eada2c30a538ff037

              SHA256

              75034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56

              SHA512

              eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945

            • C:\Users\Admin\AppData\Roaming\842RRO05\842logri.ini

              Filesize

              40B

              MD5

              d63a82e5d81e02e399090af26db0b9cb

              SHA1

              91d0014c8f54743bba141fd60c9d963f869d76c9

              SHA256

              eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

              SHA512

              38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

            • C:\Users\Admin\AppData\Roaming\842RRO05\842logrv.ini

              Filesize

              872B

              MD5

              bbc41c78bae6c71e63cb544a6a284d94

              SHA1

              33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a

              SHA256

              ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb

              SHA512

              0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

            • memory/3344-25-0x0000000000DA0000-0x0000000000DCF000-memory.dmp

              Filesize

              188KB

            • memory/3344-45-0x00000000017B0000-0x0000000001843000-memory.dmp

              Filesize

              588KB

            • memory/3344-40-0x00000000017B0000-0x0000000001843000-memory.dmp

              Filesize

              588KB

            • memory/3344-24-0x0000000002EB0000-0x00000000031FA000-memory.dmp

              Filesize

              3.3MB

            • memory/3344-23-0x0000000000DA0000-0x0000000000DCF000-memory.dmp

              Filesize

              188KB

            • memory/3344-22-0x0000000000ED0000-0x0000000000EE9000-memory.dmp

              Filesize

              100KB

            • memory/3344-21-0x0000000000ED0000-0x0000000000EE9000-memory.dmp

              Filesize

              100KB

            • memory/3428-47-0x00000000031F0000-0x0000000003361000-memory.dmp

              Filesize

              1.4MB

            • memory/3428-46-0x00000000031F0000-0x0000000003361000-memory.dmp

              Filesize

              1.4MB

            • memory/3428-55-0x00000000031F0000-0x0000000003361000-memory.dmp

              Filesize

              1.4MB

            • memory/3428-20-0x0000000009550000-0x00000000096F3000-memory.dmp

              Filesize

              1.6MB

            • memory/3676-8-0x00000000063A0000-0x00000000063AE000-memory.dmp

              Filesize

              56KB

            • memory/3676-5-0x0000000004D70000-0x0000000004D7A000-memory.dmp

              Filesize

              40KB

            • memory/3676-1-0x0000000074730000-0x0000000074EE0000-memory.dmp

              Filesize

              7.7MB

            • memory/3676-2-0x0000000005370000-0x0000000005914000-memory.dmp

              Filesize

              5.6MB

            • memory/3676-15-0x0000000074730000-0x0000000074EE0000-memory.dmp

              Filesize

              7.7MB

            • memory/3676-3-0x0000000004DC0000-0x0000000004E52000-memory.dmp

              Filesize

              584KB

            • memory/3676-12-0x0000000004CF0000-0x0000000004D00000-memory.dmp

              Filesize

              64KB

            • memory/3676-11-0x0000000074730000-0x0000000074EE0000-memory.dmp

              Filesize

              7.7MB

            • memory/3676-10-0x0000000008AF0000-0x0000000008B8C000-memory.dmp

              Filesize

              624KB

            • memory/3676-9-0x00000000063C0000-0x0000000006436000-memory.dmp

              Filesize

              472KB

            • memory/3676-0-0x00000000002B0000-0x000000000035E000-memory.dmp

              Filesize

              696KB

            • memory/3676-7-0x0000000006390000-0x000000000639A000-memory.dmp

              Filesize

              40KB

            • memory/3676-6-0x0000000005130000-0x0000000005144000-memory.dmp

              Filesize

              80KB

            • memory/3676-4-0x0000000004CF0000-0x0000000004D00000-memory.dmp

              Filesize

              64KB

            • memory/4284-19-0x0000000001810000-0x0000000001824000-memory.dmp

              Filesize

              80KB

            • memory/4284-13-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/4284-16-0x0000000001950000-0x0000000001C9A000-memory.dmp

              Filesize

              3.3MB

            • memory/4284-18-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB