Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2024 13:33

General

  • Target

    e1c967ab4b9d87b235516a57b2572ceb.exe

  • Size

    1.3MB

  • MD5

    e1c967ab4b9d87b235516a57b2572ceb

  • SHA1

    8d6e73b957a94daca6498dfc3e8a14deced74940

  • SHA256

    231540b133e8ed8746f69eea6c0fb3652a56d13f52d1acf1648215396129a687

  • SHA512

    59fab2d8d827eec4bcaf1b246b8774c5ba919eb3b2a81d093f730e08dbe85f073764ae56a441063b756279f2bfde0eb3c7921eda661a676328f31860ccfc9958

  • SSDEEP

    24576:PqpwZW5oaXpcB7mVSaccPuvcd5OGQT/1/0nS+7n4SYwqK4zf3RTsAHWAgqChJ+hu:i2Aiec+NQuiNBzgicO5nle

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

wz6a

Decoy

commonebisu.com

onlinedatingforyou.com

nomoreink.com

directcare.doctor

protego1.com

buvettechamonix.com

dissertationshelp.net

theawakenedmother.life

leonwickham.com

renaultstoreiran.com

lsxwsj.com

uniontattoosupply.com

herfitnessandbeauty.com

jesselynleephotography.com

imaginebyccp.com

athomeproductive.com

laratome.com

smoothsailingexpress.com

freedrumlessons4u.com

easylivego.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1c967ab4b9d87b235516a57b2572ceb.exe
    "C:\Users\Admin\AppData\Local\Temp\e1c967ab4b9d87b235516a57b2572ceb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3808
    • C:\Users\Admin\AppData\Local\Temp\e1c967ab4b9d87b235516a57b2572ceb.exe
      "C:\Users\Admin\AppData\Local\Temp\e1c967ab4b9d87b235516a57b2572ceb.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3560
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4472

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3560-13-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/3560-16-0x0000000001810000-0x0000000001B5A000-memory.dmp
      Filesize

      3.3MB

    • memory/3808-8-0x0000000074ED0000-0x0000000075680000-memory.dmp
      Filesize

      7.7MB

    • memory/3808-9-0x0000000005610000-0x0000000005620000-memory.dmp
      Filesize

      64KB

    • memory/3808-4-0x0000000005440000-0x00000000054D2000-memory.dmp
      Filesize

      584KB

    • memory/3808-5-0x0000000005610000-0x0000000005620000-memory.dmp
      Filesize

      64KB

    • memory/3808-6-0x0000000005370000-0x000000000537A000-memory.dmp
      Filesize

      40KB

    • memory/3808-7-0x0000000005680000-0x00000000056D6000-memory.dmp
      Filesize

      344KB

    • memory/3808-0-0x0000000074ED0000-0x0000000075680000-memory.dmp
      Filesize

      7.7MB

    • memory/3808-3-0x00000000059F0000-0x0000000005F94000-memory.dmp
      Filesize

      5.6MB

    • memory/3808-10-0x00000000067E0000-0x0000000006816000-memory.dmp
      Filesize

      216KB

    • memory/3808-11-0x00000000011E0000-0x000000000125C000-memory.dmp
      Filesize

      496KB

    • memory/3808-12-0x0000000000FD0000-0x0000000001004000-memory.dmp
      Filesize

      208KB

    • memory/3808-2-0x00000000053A0000-0x000000000543C000-memory.dmp
      Filesize

      624KB

    • memory/3808-15-0x0000000074ED0000-0x0000000075680000-memory.dmp
      Filesize

      7.7MB

    • memory/3808-1-0x0000000000820000-0x0000000000976000-memory.dmp
      Filesize

      1.3MB