Analysis

  • max time kernel
    11s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 06:46

General

  • Target

    01438966382020_pdf.exe

  • Size

    370KB

  • MD5

    abfb06139a39dec1e276b04cb62ec985

  • SHA1

    422cf21107f9ce0e2cb0e20398afde711f4374fc

  • SHA256

    7af08bbd907a68770548426050115d6b0aeba599e0c3bd03c03f5ef8268ceb11

  • SHA512

    2c3fee56e8e59a0b07cf9db17127013be4ae8b3be47dab5099d25247320fe81cfe696057c76541e567cb8cef2942a6e3b97b7b1f8584cd3363fbb5d6ce687190

  • SSDEEP

    6144:rPCganNbXQ0tyqc95+FXffzBvekHyq9s28WeC2X8cESMj+W9blvcZ97B+OeVnF:ZanG0C95+5fzHDOlWeWPN9blEHBJeVF

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

gm1

Decoy

802477.com

theclippersofficial.com

mysticadventuresails.com

joshkaeding.com

www4915a.com

nicolasdumasxiii.com

transbagasputra.com

motherdaughter.date

truflorawellness.com

ff1q.com

elettronicasmart.com

obtes.com

pfamkyr.com

9ycpbr.info

gtitdunproductions.com

mashreviews.com

methvenonthemove.com

jinshavip38.com

theedgebizconnect.com

jessandalextietheknot.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\01438966382020_pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\01438966382020_pdf.exe"
    1⤵
      PID:1648
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe AnaMetaphor,Pretor
        2⤵
          PID:2616
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe"
            3⤵
              PID:3676
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\SysWOW64\cmd.exe"
          1⤵
            PID:2656
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Windows\SysWOW64\cmd.exe"
              2⤵
                PID:2356
              • C:\Windows\SysWOW64\cmd.exe
                /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
                2⤵
                  PID:2960

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\AnaMetaphor.DLL
                Filesize

                19KB

                MD5

                eca4d3581bfee01fbbdfab46e73b8afb

                SHA1

                38b63ea322bd5f9b5ca14046a42f7ee25cf357d1

                SHA256

                2d4b4f73706eb3753f57ecf1e83e4ae68b8c07c72fe64a2aa2b0d80e5f64b7b3

                SHA512

                ef2f552f5216775aae85ac0835a7eb34498825e64961eb614a6728f76eaaef3e4ae36a847d0f7cfc30cce1b5c03e1521de93e1801db0a171dafbfbd73be66c20

              • C:\Users\Admin\AppData\Local\Temp\Chair
                Filesize

                256KB

                MD5

                2ec9f2b086bfcbd1d55e4c4a99b9fa7a

                SHA1

                1a07c44f54767d173645e17d499e0887d7305a39

                SHA256

                150a8af0387c3e34eeb24aa0ddda27dd3e811ba83f79c157fa9eeb3c736fee54

                SHA512

                4ce0c97e443c2c046e29d255c1a2453f87300daf4e7a1b6f134a1ba71c633dae3aa07420681d3808eea9fe221e732d8497c7a56cf0f95b715a14e90c13765754

              • C:\Users\Admin\AppData\Local\Temp\DB1
                Filesize

                46KB

                MD5

                8f5942354d3809f865f9767eddf51314

                SHA1

                20be11c0d42fc0cef53931ea9152b55082d1a11e

                SHA256

                776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea

                SHA512

                fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218

              • C:\Users\Admin\AppData\Roaming\-K2PO3U9\-K2logrv.ini
                Filesize

                872B

                MD5

                bbc41c78bae6c71e63cb544a6a284d94

                SHA1

                33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a

                SHA256

                ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb

                SHA512

                0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

              • memory/2616-29-0x00000000748C0000-0x0000000074988000-memory.dmp
                Filesize

                800KB

              • memory/2616-26-0x00000000748C0000-0x0000000074988000-memory.dmp
                Filesize

                800KB

              • memory/2616-27-0x00000000774C0000-0x0000000077523000-memory.dmp
                Filesize

                396KB

              • memory/2616-25-0x0000000000780000-0x0000000000782000-memory.dmp
                Filesize

                8KB

              • memory/2656-33-0x0000000000630000-0x000000000068A000-memory.dmp
                Filesize

                360KB

              • memory/2656-35-0x0000000000630000-0x000000000068A000-memory.dmp
                Filesize

                360KB

              • memory/3464-37-0x0000000007480000-0x000000000754B000-memory.dmp
                Filesize

                812KB

              • memory/3676-28-0x0000000000FA0000-0x0000000000FA6000-memory.dmp
                Filesize

                24KB

              • memory/3676-31-0x0000000000400000-0x000000000042A000-memory.dmp
                Filesize

                168KB

              • memory/3676-34-0x0000000000400000-0x000000000042A000-memory.dmp
                Filesize

                168KB