Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 01:13

General

  • Target

    3406373bb1aa978bb8c76dc322a7ddcd053b2ba782516980572bb4e79b742ffc.exe

  • Size

    1.2MB

  • MD5

    eff5dfe237f7290d49068495503bb7e9

  • SHA1

    5b488378f9c4b0359b1f41d5d68278889ccf1e8c

  • SHA256

    3406373bb1aa978bb8c76dc322a7ddcd053b2ba782516980572bb4e79b742ffc

  • SHA512

    0947df0ccb1cae24e439bffdea81471431a41baf960085c1ef2fc65762eb55a480f21e4e3d84ba828453a1fb27137fdf9d0552d80f82ed8994924704ecaa44b8

  • SSDEEP

    24576:1qDEvCTbMWu7rQYlBQcBiT6rprG8abNepSzZ6V3xhE:1TvC/MTQYxsWR7abNeUzZMB

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

se63

Decoy

socratesandhisclouds.com

versioncolor.com

ytcp011.com

908511.vip

egysrvs.com

ky5682011.cc

kkuu14.icu

wavebsb.com

klikadelivery.com

jnbxbpq.com

5o8oh.us

hemule.net

techinf.xyz

bevage.club

we37h.com

tipsde.shop

48136.vip

bestcampertrailerbrands.com

fairmedics.in

quixonic.tech

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Users\Admin\AppData\Local\Temp\3406373bb1aa978bb8c76dc322a7ddcd053b2ba782516980572bb4e79b742ffc.exe
      "C:\Users\Admin\AppData\Local\Temp\3406373bb1aa978bb8c76dc322a7ddcd053b2ba782516980572bb4e79b742ffc.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\3406373bb1aa978bb8c76dc322a7ddcd053b2ba782516980572bb4e79b742ffc.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2760
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\svchost.exe"
        3⤵
          PID:2780

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1140-17-0x0000000006650000-0x000000000678B000-memory.dmp

      Filesize

      1.2MB

    • memory/1140-34-0x0000000007040000-0x00000000071AD000-memory.dmp

      Filesize

      1.4MB

    • memory/1140-31-0x0000000007040000-0x00000000071AD000-memory.dmp

      Filesize

      1.4MB

    • memory/1140-30-0x0000000007040000-0x00000000071AD000-memory.dmp

      Filesize

      1.4MB

    • memory/1140-26-0x0000000006650000-0x000000000678B000-memory.dmp

      Filesize

      1.2MB

    • memory/1140-16-0x0000000000100000-0x0000000000200000-memory.dmp

      Filesize

      1024KB

    • memory/2456-23-0x0000000002250000-0x00000000022E4000-memory.dmp

      Filesize

      592KB

    • memory/2456-18-0x0000000000990000-0x0000000000997000-memory.dmp

      Filesize

      28KB

    • memory/2456-19-0x0000000000990000-0x0000000000997000-memory.dmp

      Filesize

      28KB

    • memory/2456-20-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/2456-21-0x0000000002440000-0x0000000002743000-memory.dmp

      Filesize

      3.0MB

    • memory/2456-22-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/2760-13-0x00000000007B0000-0x0000000000AB3000-memory.dmp

      Filesize

      3.0MB

    • memory/2760-14-0x00000000001E0000-0x00000000001F5000-memory.dmp

      Filesize

      84KB

    • memory/2760-15-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2760-11-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2900-10-0x0000000000170000-0x0000000000174000-memory.dmp

      Filesize

      16KB