Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    06/06/2024, 08:55

General

  • Target

    2.exe

  • Size

    36KB

  • MD5

    c2a39ff0162982b5b32cd40095681c40

  • SHA1

    14a7a60b9dc574b066ea39f59d72711dab9639c0

  • SHA256

    ea8636131cfb69ab935f05201fe8c285b53ccd379928825386b015ae7bb43809

  • SHA512

    3452c2dfa51691cc5da766542630a87c6e68cf93e5094981ab8905f7696e0c3c45acbf8f4a09b4410a3d5848d29d00b431b4b904472d7dbd1ed63478404172a2

  • SSDEEP

    768:pCpjO4tnumCBsT15CBHCrUCoTtBDtCYPB0t0/qigiltBN:OvnmCxXiltv

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

btrd

Decoy

everslane.com

prairieviewelectric.online

dszvhgd.com

papamuch.com

8129k.vip

jeffreestar.gold

bestguestrentals.com

nvzhuang1.net

anangtoto.com

yxfgor.top

practicalpoppers.com

thebestanglephotography.online

koormm.top

criika.net

audioflow.online

380747.net

jiuguanwang.net

bloxequities.com

v321c.com

sugar.monster

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 53 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\2.exe
      "C:\Users\Admin\AppData\Local\Temp\2.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3056
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "2" /t REG_SZ /F /D "C:\Users\Admin\Documents\2.pif"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "2" /t REG_SZ /F /D "C:\Users\Admin\Documents\2.pif"
          4⤵
          • Adds Run key to start application
          PID:2948
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c Copy "C:\Users\Admin\AppData\Local\Temp\2.exe" "C:\Users\Admin\Documents\2.pif"
        3⤵
          PID:2512
        • C:\Users\Admin\AppData\Local\Temp\2.exe
          "C:\Users\Admin\AppData\Local\Temp\2.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2808
      • C:\Windows\SysWOW64\help.exe
        "C:\Windows\SysWOW64\help.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2504
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\2.exe"
          3⤵
          • Deletes itself
          PID:2524

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1204-17-0x0000000006D40000-0x0000000006E8A000-memory.dmp

      Filesize

      1.3MB

    • memory/1204-28-0x0000000007290000-0x00000000073CB000-memory.dmp

      Filesize

      1.2MB

    • memory/1204-27-0x0000000007920000-0x0000000007A46000-memory.dmp

      Filesize

      1.1MB

    • memory/1204-22-0x0000000007290000-0x00000000073CB000-memory.dmp

      Filesize

      1.2MB

    • memory/1204-19-0x0000000006D40000-0x0000000006E8A000-memory.dmp

      Filesize

      1.3MB

    • memory/2504-25-0x0000000000110000-0x000000000013F000-memory.dmp

      Filesize

      188KB

    • memory/2504-23-0x00000000008E0000-0x00000000008E6000-memory.dmp

      Filesize

      24KB

    • memory/2504-24-0x00000000008E0000-0x00000000008E6000-memory.dmp

      Filesize

      24KB

    • memory/2808-7-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2808-8-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2808-13-0x0000000000B90000-0x0000000000E93000-memory.dmp

      Filesize

      3.0MB

    • memory/2808-16-0x00000000002D0000-0x00000000002E4000-memory.dmp

      Filesize

      80KB

    • memory/2808-15-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2808-11-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2808-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2808-20-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2808-21-0x0000000000330000-0x0000000000344000-memory.dmp

      Filesize

      80KB

    • memory/3056-12-0x00000000746B0000-0x0000000074D9E000-memory.dmp

      Filesize

      6.9MB

    • memory/3056-0-0x00000000746BE000-0x00000000746BF000-memory.dmp

      Filesize

      4KB

    • memory/3056-6-0x00000000746B0000-0x0000000074D9E000-memory.dmp

      Filesize

      6.9MB

    • memory/3056-3-0x0000000004BC0000-0x0000000004C38000-memory.dmp

      Filesize

      480KB

    • memory/3056-2-0x00000000746B0000-0x0000000074D9E000-memory.dmp

      Filesize

      6.9MB

    • memory/3056-1-0x0000000000B80000-0x0000000000B8E000-memory.dmp

      Filesize

      56KB