Analysis Overview
SHA256
d1587f2e2df98248ed1e4e4cb5cc77f9831bff26606b8d8a04c1ae703d7a9390
Threat Level: Known bad
The file 8e0cab6e15c8ecf53d170b396a5cdb6db74f1a8cc5bfd408ef5d480f25fa358c.zip was found to be: Known bad.
Malicious Activity Summary
Formbook
Formbook payload
Deletes itself
Suspicious use of SetThreadContext
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-04-02 11:28
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-02 11:28
Reported
2024-04-02 11:31
Platform
win7-20240221-en
Max time kernel
148s
Max time network
124s
Command Line
Signatures
Formbook
Formbook payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\cmd.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1400 set thread context of 2968 | N/A | C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe | C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe |
| PID 2968 set thread context of 1408 | N/A | C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe | C:\Windows\Explorer.EXE |
| PID 2456 set thread context of 1408 | N/A | C:\Windows\SysWOW64\wininit.exe | C:\Windows\Explorer.EXE |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\wininit.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\wininit.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\wininit.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe
"C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe"
C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe
"C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe"
C:\Windows\SysWOW64\wininit.exe
"C:\Windows\SysWOW64\wininit.exe"
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe"
Network
Files
memory/1400-1-0x0000000074390000-0x0000000074A7E000-memory.dmp
memory/1400-0-0x0000000000B80000-0x0000000000C1C000-memory.dmp
memory/1400-2-0x0000000004870000-0x00000000048B0000-memory.dmp
memory/1400-3-0x0000000000210000-0x0000000000224000-memory.dmp
memory/1400-4-0x0000000000430000-0x000000000043A000-memory.dmp
memory/1400-5-0x0000000000480000-0x000000000048C000-memory.dmp
memory/1400-6-0x0000000004D40000-0x0000000004DB6000-memory.dmp
memory/2968-7-0x0000000000400000-0x000000000042F000-memory.dmp
memory/2968-8-0x0000000000400000-0x000000000042F000-memory.dmp
memory/2968-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2968-11-0x0000000000400000-0x000000000042F000-memory.dmp
memory/1400-12-0x0000000074390000-0x0000000074A7E000-memory.dmp
memory/2968-13-0x0000000000C20000-0x0000000000F23000-memory.dmp
memory/2968-16-0x0000000000130000-0x0000000000144000-memory.dmp
memory/1408-17-0x0000000002CF0000-0x0000000002DF0000-memory.dmp
memory/2968-15-0x0000000000400000-0x000000000042F000-memory.dmp
memory/1408-18-0x00000000070C0000-0x00000000071F6000-memory.dmp
memory/2456-19-0x0000000000BF0000-0x0000000000C0A000-memory.dmp
memory/2456-20-0x0000000000BF0000-0x0000000000C0A000-memory.dmp
memory/2456-21-0x00000000000D0000-0x00000000000FF000-memory.dmp
memory/2456-22-0x0000000002010000-0x0000000002313000-memory.dmp
memory/2456-23-0x00000000000D0000-0x00000000000FF000-memory.dmp
memory/2456-25-0x0000000000930000-0x00000000009C3000-memory.dmp
memory/1408-26-0x0000000002CF0000-0x0000000002DF0000-memory.dmp
memory/1408-27-0x00000000070C0000-0x00000000071F6000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-02 11:28
Reported
2024-04-02 11:31
Platform
win10v2004-20240226-en
Max time kernel
150s
Max time network
153s
Command Line
Signatures
Formbook
Formbook payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1120 set thread context of 1752 | N/A | C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe | C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe |
| PID 1752 set thread context of 3472 | N/A | C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe | C:\Windows\Explorer.EXE |
| PID 1252 set thread context of 3472 | N/A | C:\Windows\SysWOW64\help.exe | C:\Windows\Explorer.EXE |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\help.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\help.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\help.exe | N/A |
Suspicious use of UnmapMainImage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Explorer.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe
"C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe"
C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe
"C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe"
C:\Windows\SysWOW64\help.exe
"C:\Windows\SysWOW64\help.exe"
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Users\Admin\AppData\Local\Temp\bnY2j1hTDlb4vxF.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 202.110.86.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 20.231.121.79:80 | tcp | |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 24.66.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.childnchestcare.com | udp |
| FR | 149.100.144.112:80 | www.childnchestcare.com | tcp |
| US | 8.8.8.8:53 | 112.144.100.149.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.ventasemail.com | udp |
| US | 35.212.81.132:80 | www.ventasemail.com | tcp |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 132.81.212.35.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.agathis.fun | udp |
| US | 188.114.97.2:80 | www.agathis.fun | tcp |
| US | 8.8.8.8:53 | 2.97.114.188.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.594545.xyz | udp |
| US | 8.8.8.8:53 | 27.178.89.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp | |
| N/A | 3.64.163.50:80 | tcp |
Files
memory/1120-0-0x0000000000480000-0x000000000051C000-memory.dmp
memory/1120-1-0x00000000752B0000-0x0000000075A60000-memory.dmp
memory/1120-2-0x0000000005570000-0x0000000005B14000-memory.dmp
memory/1120-3-0x0000000004FC0000-0x0000000005052000-memory.dmp
memory/1120-4-0x0000000004EA0000-0x0000000004EB0000-memory.dmp
memory/1120-5-0x0000000004F20000-0x0000000004F2A000-memory.dmp
memory/1120-6-0x00000000051A0000-0x00000000051B4000-memory.dmp
memory/1120-8-0x00000000051D0000-0x00000000051DC000-memory.dmp
memory/1120-7-0x00000000051C0000-0x00000000051CA000-memory.dmp
memory/1120-9-0x0000000006440000-0x00000000064B6000-memory.dmp
memory/1120-10-0x0000000008B50000-0x0000000008BEC000-memory.dmp
memory/1752-11-0x0000000000400000-0x000000000042F000-memory.dmp
memory/1120-13-0x00000000752B0000-0x0000000075A60000-memory.dmp
memory/1752-14-0x00000000016C0000-0x0000000001A0A000-memory.dmp
memory/1752-16-0x0000000000400000-0x000000000042F000-memory.dmp
memory/1752-17-0x0000000001640000-0x0000000001654000-memory.dmp
memory/3472-18-0x0000000002E70000-0x0000000002F23000-memory.dmp
memory/1252-19-0x0000000000220000-0x0000000000227000-memory.dmp
memory/1252-20-0x0000000000220000-0x0000000000227000-memory.dmp
memory/1252-21-0x0000000000E60000-0x0000000000E8F000-memory.dmp
memory/1252-22-0x0000000001630000-0x000000000197A000-memory.dmp
memory/1252-23-0x0000000000E60000-0x0000000000E8F000-memory.dmp
memory/1252-25-0x0000000001460000-0x00000000014F3000-memory.dmp
memory/3472-26-0x0000000002FA0000-0x0000000003093000-memory.dmp
memory/3472-27-0x0000000002FA0000-0x0000000003093000-memory.dmp
memory/3472-28-0x0000000002E70000-0x0000000002F23000-memory.dmp