Analysis

  • max time kernel
    146s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2024, 00:53

General

  • Target

    ccb0793dd5bf74d13a395578ff6b3970.exe

  • Size

    477KB

  • MD5

    ccb0793dd5bf74d13a395578ff6b3970

  • SHA1

    706efce815320e5c287d1ad58109a0af78f48ed1

  • SHA256

    f563c2c4fd980b0ed5f8b3b6af0039048c35c330936d948e5e51f6b29986bc34

  • SHA512

    b9c278110a6ff27f7ed6274e14bf80c02448c8b4df5c899efab2c5675564a95bf2b8054b8fd484e24e90b9951f44d2ec20742e63297b7b94b924d1e59c499cd7

  • SSDEEP

    6144:zJzKf/zmCja4qQmQCrcbnFuuUcTFx0T21BOcCSaa1MSSB6T1KpQcHCbh+:zJY1ja4qQ+rcbFudkuN/S/1MSSPQcHKk

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

fr

Decoy

geturstuff.life

kisakollections.com

bkipmtahuna.com

aoxou.com

thebigandfreeupdates.download

utvtribe.com

icontoken.com

naturexperience.com

h2sentertainmentcafe.com

careerproresumepa.com

franchiseindia.directory

psychouniversity.com

traveng.com

mylifestylebyclem.com

greentmraelty.com

imoneg.com

lupusrebelacademy.com

ghqxc.info

lylulidbd.com

dalfreestyle.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Users\Admin\AppData\Local\Temp\ccb0793dd5bf74d13a395578ff6b3970.exe
      "C:\Users\Admin\AppData\Local\Temp\ccb0793dd5bf74d13a395578ff6b3970.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4744
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\ccb0793dd5bf74d13a395578ff6b3970.exe" "C:\Users\Admin\AppData\Local\syscheck.exe"
        3⤵
          PID:4544
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\syscheck.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1220
          • C:\Users\Admin\AppData\Local\syscheck.exe
            "C:\Users\Admin\AppData\Local\syscheck.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:492
            • C:\Users\Admin\AppData\Local\syscheck.exe
              "C:\Users\Admin\AppData\Local\syscheck.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:4348
      • C:\Windows\SysWOW64\control.exe
        "C:\Windows\SysWOW64\control.exe"
        2⤵
        • Adds policy Run key to start application
        • Suspicious use of SetThreadContext
        • Drops file in Program Files directory
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4388
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\syscheck.exe"
          3⤵
            PID:2692
          • C:\Windows\SysWOW64\cmd.exe
            /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
            3⤵
              PID:3560

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DB1

          Filesize

          46KB

          MD5

          02d2c46697e3714e49f46b680b9a6b83

          SHA1

          84f98b56d49f01e9b6b76a4e21accf64fd319140

          SHA256

          522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

          SHA512

          60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

        • C:\Users\Admin\AppData\Local\syscheck.exe

          Filesize

          477KB

          MD5

          ccb0793dd5bf74d13a395578ff6b3970

          SHA1

          706efce815320e5c287d1ad58109a0af78f48ed1

          SHA256

          f563c2c4fd980b0ed5f8b3b6af0039048c35c330936d948e5e51f6b29986bc34

          SHA512

          b9c278110a6ff27f7ed6274e14bf80c02448c8b4df5c899efab2c5675564a95bf2b8054b8fd484e24e90b9951f44d2ec20742e63297b7b94b924d1e59c499cd7

        • C:\Users\Admin\AppData\Roaming\5K9246DE\5K9logim.jpeg

          Filesize

          82KB

          MD5

          622dc591f041f9197faa5247247a0785

          SHA1

          fa0d8233152aaadcd6e2b0887662929397483985

          SHA256

          2990bc465a9fddbc9853d6961ae45904dfa59c68c792806ed81841c7745abac5

          SHA512

          f40081776f2830cede9ebbe649e20bed27f5ec678908a46bca5f68fa347715f4b0b44c512b9a0240d450a3638937784d85764cf3c14e882eb19fb089a48e6182

        • C:\Users\Admin\AppData\Roaming\5K9246DE\5K9logrg.ini

          Filesize

          38B

          MD5

          4aadf49fed30e4c9b3fe4a3dd6445ebe

          SHA1

          1e332822167c6f351b99615eada2c30a538ff037

          SHA256

          75034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56

          SHA512

          eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945

        • C:\Users\Admin\AppData\Roaming\5K9246DE\5K9logri.ini

          Filesize

          40B

          MD5

          d63a82e5d81e02e399090af26db0b9cb

          SHA1

          91d0014c8f54743bba141fd60c9d963f869d76c9

          SHA256

          eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

          SHA512

          38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

        • C:\Users\Admin\AppData\Roaming\5K9246DE\5K9logrv.ini

          Filesize

          872B

          MD5

          bbc41c78bae6c71e63cb544a6a284d94

          SHA1

          33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a

          SHA256

          ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb

          SHA512

          0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

        • memory/492-17-0x0000000074450000-0x0000000074C00000-memory.dmp

          Filesize

          7.7MB

        • memory/492-23-0x0000000074450000-0x0000000074C00000-memory.dmp

          Filesize

          7.7MB

        • memory/492-19-0x0000000005930000-0x00000000059CC000-memory.dmp

          Filesize

          624KB

        • memory/492-18-0x0000000004B90000-0x0000000004BA0000-memory.dmp

          Filesize

          64KB

        • memory/492-15-0x0000000074450000-0x0000000074C00000-memory.dmp

          Filesize

          7.7MB

        • memory/492-16-0x0000000004B90000-0x0000000004BA0000-memory.dmp

          Filesize

          64KB

        • memory/3428-36-0x00000000074B0000-0x0000000007592000-memory.dmp

          Filesize

          904KB

        • memory/3428-28-0x00000000074B0000-0x0000000007592000-memory.dmp

          Filesize

          904KB

        • memory/3428-60-0x0000000007F00000-0x0000000008064000-memory.dmp

          Filesize

          1.4MB

        • memory/3428-37-0x0000000007F00000-0x0000000008064000-memory.dmp

          Filesize

          1.4MB

        • memory/3428-35-0x0000000007F00000-0x0000000008064000-memory.dmp

          Filesize

          1.4MB

        • memory/4348-26-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/4348-20-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/4348-24-0x0000000001030000-0x000000000137A000-memory.dmp

          Filesize

          3.3MB

        • memory/4348-27-0x0000000000EC0000-0x0000000000ED4000-memory.dmp

          Filesize

          80KB

        • memory/4388-29-0x0000000000780000-0x00000000007A7000-memory.dmp

          Filesize

          156KB

        • memory/4388-30-0x0000000000780000-0x00000000007A7000-memory.dmp

          Filesize

          156KB

        • memory/4388-31-0x0000000000460000-0x000000000048A000-memory.dmp

          Filesize

          168KB

        • memory/4388-32-0x0000000002460000-0x00000000027AA000-memory.dmp

          Filesize

          3.3MB

        • memory/4388-33-0x00000000021A0000-0x0000000002233000-memory.dmp

          Filesize

          588KB

        • memory/4388-39-0x0000000000460000-0x000000000048A000-memory.dmp

          Filesize

          168KB

        • memory/4744-8-0x0000000074450000-0x0000000074C00000-memory.dmp

          Filesize

          7.7MB

        • memory/4744-1-0x0000000074450000-0x0000000074C00000-memory.dmp

          Filesize

          7.7MB

        • memory/4744-11-0x0000000074450000-0x0000000074C00000-memory.dmp

          Filesize

          7.7MB

        • memory/4744-5-0x0000000005030000-0x0000000005040000-memory.dmp

          Filesize

          64KB

        • memory/4744-4-0x0000000004EA0000-0x0000000004EBC000-memory.dmp

          Filesize

          112KB

        • memory/4744-3-0x0000000004F30000-0x0000000004FC2000-memory.dmp

          Filesize

          584KB

        • memory/4744-2-0x00000000054E0000-0x0000000005A84000-memory.dmp

          Filesize

          5.6MB

        • memory/4744-0-0x0000000000460000-0x00000000004DE000-memory.dmp

          Filesize

          504KB

        • memory/4744-9-0x0000000005030000-0x0000000005040000-memory.dmp

          Filesize

          64KB