Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    18-05-2024 20:05

General

  • Target

    40e74255e2f90ce56eb01d773cb44430_NeikiAnalytics.exe

  • Size

    666KB

  • MD5

    40e74255e2f90ce56eb01d773cb44430

  • SHA1

    570e9c660c5a443e3dadd72b96e8c638b29617c5

  • SHA256

    7fbc12b655c7152aa2a5606966d5158e07f559570610f58822f14d5cd531bba0

  • SHA512

    af5c433bfa29c3b1a3e6ad72df92fe5b3fb1b7e1ee55a98d46002eb5ba7ffaee2c7c525786aa9abe4b92cda9838dbf3d20000db71a56b7d969166fbcc86c1d67

  • SSDEEP

    12288:uF0pei36RoX53sdDU7N++kuy6msWk6M87mHytLVx5iOB63ywXlyj5KSpuqhYUqar:uKpp362X53h7YkWkt3SRVx0KOySIE0us

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

38gc

Decoy

fgoz3kry51.asia

vanishingacthairremoval.com

onlinelearningsandbox.com

feluca-egypt.com

goforsourcing.com

hairmadeperfect.com

brockspaydayearners.com

vintagetoj.com

tjandthecampers.com

emkanelajiehes.com

bestundersinkwaterfilter.com

proatta777.com

satuslot.beauty

nicolesbodybutter.com

montecarlogallery.com

homeautomation.one

cx-n1.ink

spennys.casa

gaozgn.cfd

hakajimai.online

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40e74255e2f90ce56eb01d773cb44430_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\40e74255e2f90ce56eb01d773cb44430_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Local\Temp\40e74255e2f90ce56eb01d773cb44430_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\40e74255e2f90ce56eb01d773cb44430_NeikiAnalytics.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2920

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2068-6-0x0000000004C50000-0x0000000004CC6000-memory.dmp

    Filesize

    472KB

  • memory/2068-1-0x00000000008F0000-0x000000000099C000-memory.dmp

    Filesize

    688KB

  • memory/2068-2-0x00000000742C0000-0x00000000749AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2068-3-0x0000000001ED0000-0x0000000001EF2000-memory.dmp

    Filesize

    136KB

  • memory/2068-4-0x0000000001DA0000-0x0000000001DAC000-memory.dmp

    Filesize

    48KB

  • memory/2068-5-0x00000000004B0000-0x00000000004C0000-memory.dmp

    Filesize

    64KB

  • memory/2068-0-0x00000000742CE000-0x00000000742CF000-memory.dmp

    Filesize

    4KB

  • memory/2068-14-0x00000000742C0000-0x00000000749AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2920-7-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2920-9-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2920-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2920-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2920-15-0x0000000000B30000-0x0000000000E33000-memory.dmp

    Filesize

    3.0MB