Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2024, 02:30

General

  • Target

    General Specifications - INVACO PVT.exe

  • Size

    1.4MB

  • MD5

    86dc1dcdf5980995145d57d0013223b1

  • SHA1

    8df0370d6533d9fa9b356c4d2a074382be12e526

  • SHA256

    9d854bdc9a85a09795e1354f1d48f2df47d0fef8d365abf065f287b9c3e7d190

  • SHA512

    cb92f042d3f2b1b76b08b61b8fa4e5dd4a9b51daa1807374392f9058accb3d37c56790597faff8abef17b9436f2d8a6c7ebb3580d4ae3c26dcf9bae806523605

  • SSDEEP

    24576:IAHnh+eWsN3skA4RV1Hom2KXMmHaI3Kyz/DYDy6cwmb5:Ph+ZkldoPK8YaI3Ky7JT/

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

kh11

Decoy

theluckypaddle.net

assurelinkenterprises.com

gazpachogroup.com

worxservicesllc.com

bestecankurban.com

cotebrief.com

899173.com

navist.io

metaverseharem.com

genpower-plus.com

drhandgrip.com

jessicachristina.com

eidura.com

cat2000andhope1izfanfiction.com

nywaiverlatam.com

cdlb9twt.shop

j2mjewerly.com

itsmisshodges.com

timeis.shop

santefe4g.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\AppData\Local\Temp\General Specifications - INVACO PVT.exe
      "C:\Users\Admin\AppData\Local\Temp\General Specifications - INVACO PVT.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\General Specifications - INVACO PVT.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2560
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 316
        3⤵
        • Program crash
        PID:2980
    • C:\Windows\SysWOW64\help.exe
      "C:\Windows\SysWOW64\help.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2612
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\svchost.exe"
        3⤵
          PID:2704

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1196-28-0x00000000051F0000-0x0000000005371000-memory.dmp

            Filesize

            1.5MB

          • memory/1196-14-0x0000000003B10000-0x0000000003C10000-memory.dmp

            Filesize

            1024KB

          • memory/1196-17-0x00000000050B0000-0x00000000051E8000-memory.dmp

            Filesize

            1.2MB

          • memory/1196-32-0x00000000051F0000-0x0000000005371000-memory.dmp

            Filesize

            1.5MB

          • memory/1196-29-0x00000000051F0000-0x0000000005371000-memory.dmp

            Filesize

            1.5MB

          • memory/2316-10-0x0000000000120000-0x0000000000124000-memory.dmp

            Filesize

            16KB

          • memory/2560-11-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2560-12-0x00000000008A0000-0x0000000000BA3000-memory.dmp

            Filesize

            3.0MB

          • memory/2560-16-0x0000000000180000-0x0000000000194000-memory.dmp

            Filesize

            80KB

          • memory/2560-15-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2612-19-0x0000000000600000-0x0000000000606000-memory.dmp

            Filesize

            24KB

          • memory/2612-22-0x0000000000080000-0x00000000000AF000-memory.dmp

            Filesize

            188KB

          • memory/2612-25-0x0000000000440000-0x00000000004D3000-memory.dmp

            Filesize

            588KB

          • memory/2612-21-0x00000000008B0000-0x0000000000BB3000-memory.dmp

            Filesize

            3.0MB

          • memory/2612-20-0x0000000000080000-0x00000000000AF000-memory.dmp

            Filesize

            188KB

          • memory/2612-18-0x0000000000600000-0x0000000000606000-memory.dmp

            Filesize

            24KB