Analysis

  • max time kernel
    148s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 06:46

General

  • Target

    01438966382020_pdf.exe

  • Size

    370KB

  • MD5

    abfb06139a39dec1e276b04cb62ec985

  • SHA1

    422cf21107f9ce0e2cb0e20398afde711f4374fc

  • SHA256

    7af08bbd907a68770548426050115d6b0aeba599e0c3bd03c03f5ef8268ceb11

  • SHA512

    2c3fee56e8e59a0b07cf9db17127013be4ae8b3be47dab5099d25247320fe81cfe696057c76541e567cb8cef2942a6e3b97b7b1f8584cd3363fbb5d6ce687190

  • SSDEEP

    6144:rPCganNbXQ0tyqc95+FXffzBvekHyq9s28WeC2X8cESMj+W9blvcZ97B+OeVnF:ZanG0C95+5fzHDOlWeWPN9blEHBJeVF

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

gm1

Decoy

802477.com

theclippersofficial.com

mysticadventuresails.com

joshkaeding.com

www4915a.com

nicolasdumasxiii.com

transbagasputra.com

motherdaughter.date

truflorawellness.com

ff1q.com

elettronicasmart.com

obtes.com

pfamkyr.com

9ycpbr.info

gtitdunproductions.com

mashreviews.com

methvenonthemove.com

jinshavip38.com

theedgebizconnect.com

jessandalextietheknot.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\01438966382020_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\01438966382020_pdf.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1340
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe AnaMetaphor,Pretor
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2688
    • C:\Windows\SysWOW64\cscript.exe
      "C:\Windows\SysWOW64\cscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\cmd.exe"
        3⤵
          PID:2196

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\AnaMetaphor.DLL
      Filesize

      19KB

      MD5

      eca4d3581bfee01fbbdfab46e73b8afb

      SHA1

      38b63ea322bd5f9b5ca14046a42f7ee25cf357d1

      SHA256

      2d4b4f73706eb3753f57ecf1e83e4ae68b8c07c72fe64a2aa2b0d80e5f64b7b3

      SHA512

      ef2f552f5216775aae85ac0835a7eb34498825e64961eb614a6728f76eaaef3e4ae36a847d0f7cfc30cce1b5c03e1521de93e1801db0a171dafbfbd73be66c20

    • C:\Users\Admin\AppData\Local\Temp\Chair
      Filesize

      256KB

      MD5

      2ec9f2b086bfcbd1d55e4c4a99b9fa7a

      SHA1

      1a07c44f54767d173645e17d499e0887d7305a39

      SHA256

      150a8af0387c3e34eeb24aa0ddda27dd3e811ba83f79c157fa9eeb3c736fee54

      SHA512

      4ce0c97e443c2c046e29d255c1a2453f87300daf4e7a1b6f134a1ba71c633dae3aa07420681d3808eea9fe221e732d8497c7a56cf0f95b715a14e90c13765754

    • memory/1208-42-0x0000000004C70000-0x0000000004DA5000-memory.dmp
      Filesize

      1.2MB

    • memory/1208-37-0x0000000004C70000-0x0000000004DA5000-memory.dmp
      Filesize

      1.2MB

    • memory/1208-34-0x0000000000010000-0x0000000000020000-memory.dmp
      Filesize

      64KB

    • memory/2688-32-0x00000000020F0000-0x00000000023F3000-memory.dmp
      Filesize

      3.0MB

    • memory/2688-31-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2688-28-0x00000000000D0000-0x00000000000D6000-memory.dmp
      Filesize

      24KB

    • memory/2688-35-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/2688-36-0x0000000000340000-0x0000000000354000-memory.dmp
      Filesize

      80KB

    • memory/2728-29-0x0000000074EB0000-0x0000000074F08000-memory.dmp
      Filesize

      352KB

    • memory/2728-27-0x0000000076170000-0x00000000761A5000-memory.dmp
      Filesize

      212KB

    • memory/2728-25-0x0000000074EB0000-0x0000000074F08000-memory.dmp
      Filesize

      352KB

    • memory/2728-26-0x00000000000C0000-0x00000000000C2000-memory.dmp
      Filesize

      8KB

    • memory/2788-39-0x0000000000CF0000-0x0000000000D12000-memory.dmp
      Filesize

      136KB

    • memory/2788-38-0x0000000000CF0000-0x0000000000D12000-memory.dmp
      Filesize

      136KB