Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 02:43

General

  • Target

    483080c26096e479fad0997bedffb6dd.exe

  • Size

    456KB

  • MD5

    483080c26096e479fad0997bedffb6dd

  • SHA1

    d7362052d9c1451b235075703b6c88f02d5ef71e

  • SHA256

    e16af0a74030cfbd17c2086bc1151995852fb5333949a54dfb36bc2992bb87eb

  • SHA512

    c976033a62a43766a71c7009d69d464f43f7de75db9228282467c35efcd25ec1905ff8e2c4422351edddd3ca7aa033cd62016b92a6d3ab8b45b6ec8bdb5b61fc

  • SSDEEP

    6144:Q/mPIFTMlikyqCQB+cxnQdoQsk+xi72mINsaU9h:Q0UwxyqCwFQdz+ojaU9h

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

sa

Decoy

masleyscabinetshop.com

drmarissathomas.com

alkalinewaterpurifier.com

kabluchok.com

jqm65e51.biz

hellomelmel.com

futsalfutsal.com

speedyrooftarp.com

cyberhostingnet.com

295qp.com

fais-moi-une-offre.com

maketing.today

thedevicreations.com

domuservizi.online

goldanddenim.com

oimkv4.info

benefitmanagementllc401k.com

niniiiiii.com

shortkits.com

nukamika.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\483080c26096e479fad0997bedffb6dd.exe
    "C:\Users\Admin\AppData\Local\Temp\483080c26096e479fad0997bedffb6dd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Users\Admin\AppData\Local\Temp\483080c26096e479fad0997bedffb6dd.exe
      "C:\Users\Admin\AppData\Local\Temp\483080c26096e479fad0997bedffb6dd.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2496

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1312-0-0x000000007436E000-0x000000007436F000-memory.dmp
    Filesize

    4KB

  • memory/1312-1-0x0000000000A50000-0x0000000000AC8000-memory.dmp
    Filesize

    480KB

  • memory/1312-2-0x0000000000430000-0x0000000000450000-memory.dmp
    Filesize

    128KB

  • memory/1312-3-0x0000000074360000-0x0000000074A4E000-memory.dmp
    Filesize

    6.9MB

  • memory/1312-4-0x000000007436E000-0x000000007436F000-memory.dmp
    Filesize

    4KB

  • memory/1312-5-0x0000000074360000-0x0000000074A4E000-memory.dmp
    Filesize

    6.9MB

  • memory/1312-6-0x0000000074360000-0x0000000074A4E000-memory.dmp
    Filesize

    6.9MB

  • memory/1312-9-0x0000000074360000-0x0000000074A4E000-memory.dmp
    Filesize

    6.9MB

  • memory/2496-7-0x0000000000080000-0x00000000000AA000-memory.dmp
    Filesize

    168KB

  • memory/2496-10-0x0000000000AD0000-0x0000000000DD3000-memory.dmp
    Filesize

    3.0MB