Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 01:23

General

  • Target

    a40b613bca52ec196d6be4ac375d9076922b41cc4742c15a2ff1137bd6400eb7.exe

  • Size

    981KB

  • MD5

    249c382387f592eafab7e20a55560280

  • SHA1

    364c13a8ac03c9708d92fa01e5d9d442c94f75dc

  • SHA256

    a40b613bca52ec196d6be4ac375d9076922b41cc4742c15a2ff1137bd6400eb7

  • SHA512

    4c8ff6f05af4967c9d40638c86ea360d9b452d1be86ae6739e9fe36f84e20f7577032d4e32e349a1819777a1af2ce6515356a31533e1f269dbfd18fc86902ad5

  • SSDEEP

    12288:X3/p8sL8kKR0zIYaGzp9t6Mde/l5KCuz65cgOGsLNaYuPjIG4Z6jf:n/p8/pR0EYp9wMdM5Juz6INKPjR4q

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

uu09

Decoy

gnbojjfds.xyz

thepinkpen.net

oclocksl.com

aaaajjjjjffff.com

onlineppl.com

rokomariebook.com

protagonagency.store

brilliant.radio

amaniyaonline.shop

bouqclub.net

mrtranceman.com

mybet88gacor.com

huixua.shop

foundersdao.xyz

pileasures.top

summit-rhode.com

6wwr.top

randombutessential.com

ux-design-courses-85926.bond

domainz.rent

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\a40b613bca52ec196d6be4ac375d9076922b41cc4742c15a2ff1137bd6400eb7.exe
        "C:\Users\Admin\AppData\Local\Temp\a40b613bca52ec196d6be4ac375d9076922b41cc4742c15a2ff1137bd6400eb7.exe"
        2⤵
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: RenamesItself
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Users\Admin\AppData\Local\Temp\sype.exe
          "C:\Users\Admin\AppData\Local\Temp\sype.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2956
          • C:\Windows\SysWOW64\cmd.exe
            "cmd" /c ping 127.0.0.1 -n 11 > nul && copy "C:\Users\Admin\AppData\Local\Temp\sype.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skpye.exe" && ping 127.0.0.1 -n 11 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skpye.exe"
            4⤵
            • Drops startup file
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2784
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1 -n 11
              5⤵
              • Runs ping.exe
              PID:2444
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1 -n 11
              5⤵
              • Runs ping.exe
              PID:2872
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skpye.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skpye.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:864
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                6⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2732
                • C:\Windows\SysWOW64\chkdsk.exe
                  "C:\Windows\SysWOW64\chkdsk.exe"
                  7⤵
                  • Suspicious use of SetThreadContext
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:488
                  • C:\Windows\SysWOW64\cmd.exe
                    /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    8⤵
                      PID:2504

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skpye.exe

        Filesize

        981KB

        MD5

        249c382387f592eafab7e20a55560280

        SHA1

        364c13a8ac03c9708d92fa01e5d9d442c94f75dc

        SHA256

        a40b613bca52ec196d6be4ac375d9076922b41cc4742c15a2ff1137bd6400eb7

        SHA512

        4c8ff6f05af4967c9d40638c86ea360d9b452d1be86ae6739e9fe36f84e20f7577032d4e32e349a1819777a1af2ce6515356a31533e1f269dbfd18fc86902ad5

      • memory/488-48-0x0000000001E40000-0x0000000001ED3000-memory.dmp

        Filesize

        588KB

      • memory/488-47-0x0000000000080000-0x00000000000AF000-memory.dmp

        Filesize

        188KB

      • memory/488-46-0x0000000001FD0000-0x00000000022D3000-memory.dmp

        Filesize

        3.0MB

      • memory/488-45-0x0000000000080000-0x00000000000AF000-memory.dmp

        Filesize

        188KB

      • memory/488-44-0x0000000000220000-0x0000000000227000-memory.dmp

        Filesize

        28KB

      • memory/488-43-0x0000000000220000-0x0000000000227000-memory.dmp

        Filesize

        28KB

      • memory/864-29-0x0000000001040000-0x0000000001080000-memory.dmp

        Filesize

        256KB

      • memory/864-31-0x00000000749E0000-0x00000000750CE000-memory.dmp

        Filesize

        6.9MB

      • memory/864-19-0x00000000749E0000-0x00000000750CE000-memory.dmp

        Filesize

        6.9MB

      • memory/864-20-0x00000000011C0000-0x00000000012BC000-memory.dmp

        Filesize

        1008KB

      • memory/864-21-0x0000000001040000-0x0000000001080000-memory.dmp

        Filesize

        256KB

      • memory/864-22-0x0000000000B90000-0x0000000000BAA000-memory.dmp

        Filesize

        104KB

      • memory/864-23-0x00000000004E0000-0x00000000004E6000-memory.dmp

        Filesize

        24KB

      • memory/864-28-0x00000000749E0000-0x00000000750CE000-memory.dmp

        Filesize

        6.9MB

      • memory/1200-49-0x0000000008890000-0x0000000008A33000-memory.dmp

        Filesize

        1.6MB

      • memory/1200-36-0x0000000000320000-0x0000000000420000-memory.dmp

        Filesize

        1024KB

      • memory/1200-42-0x0000000008890000-0x0000000008A33000-memory.dmp

        Filesize

        1.6MB

      • memory/1200-37-0x0000000006390000-0x0000000006507000-memory.dmp

        Filesize

        1.5MB

      • memory/1624-1-0x0000000074A30000-0x000000007511E000-memory.dmp

        Filesize

        6.9MB

      • memory/1624-2-0x00000000049C0000-0x0000000004A00000-memory.dmp

        Filesize

        256KB

      • memory/1624-0-0x0000000000E20000-0x0000000000F1C000-memory.dmp

        Filesize

        1008KB

      • memory/1624-3-0x0000000000D90000-0x0000000000DD4000-memory.dmp

        Filesize

        272KB

      • memory/1624-5-0x0000000074A30000-0x000000007511E000-memory.dmp

        Filesize

        6.9MB

      • memory/2732-34-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2732-35-0x0000000000140000-0x0000000000154000-memory.dmp

        Filesize

        80KB

      • memory/2732-39-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2732-40-0x00000000001D0000-0x00000000001E4000-memory.dmp

        Filesize

        80KB

      • memory/2732-32-0x0000000000950000-0x0000000000C53000-memory.dmp

        Filesize

        3.0MB

      • memory/2732-30-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2732-26-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2732-25-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2732-24-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2956-8-0x0000000074A30000-0x000000007511E000-memory.dmp

        Filesize

        6.9MB

      • memory/2956-7-0x0000000004D30000-0x0000000004D70000-memory.dmp

        Filesize

        256KB

      • memory/2956-6-0x0000000074A30000-0x000000007511E000-memory.dmp

        Filesize

        6.9MB