Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 22:36

General

  • Target

    PO#A91641-MSKU9953077.exe

  • Size

    428KB

  • MD5

    5ccd1492d563b11ffdfd66d51aa370b5

  • SHA1

    3a7441cb83f5ca0732e8826f164c087b077a69a5

  • SHA256

    e777d588f24e21fdcc3add6de5b93d5fb498b594a59f03d02b5a7880bc5d5180

  • SHA512

    11625c6391526fd798ed1d22b8df9a5278241b4b2ec0e37d1d8493ef5a7f1fad4f4d850c67713a431d38739a43d5b7e88394dc039de49ae986e7b215be2f5444

  • SSDEEP

    6144:cbhdbMroO/lGquzY2ZmmjrmQGnHpnP6aupTzqfU0IgDKTTVz6TRvdqs0QC+VkTfW:IbMrQHzY2ZDgR6aKiIgDQVyYAkTfg

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ergs

Decoy

oceanprimesanfrancisco.com

dk-tnc.com

sodangwang.com

abrat-ed.com

dusubiqiqijem.xyz

getsup.online

homeneto.com

shose8.com

tronlane.com

nidowicosasod.xyz

independienteatleticclub.com

pca-winschool.com

realbadnastystories.site

bluevioletfloral.com

simplifiedpeacepodcast.com

abcfreediving.com

theyardbunny.com

holoique.com

ibkr1325.com

tjnfioou.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe
      "C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3244
      • C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe
        "C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"
        3⤵
          PID:4416
        • C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe
          "C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4448
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:2932
        • C:\Windows\SysWOW64\NETSTAT.EXE
          "C:\Windows\SysWOW64\NETSTAT.EXE"
          2⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Gathers network information
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1160
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:1656

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1160-28-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1160-26-0x00000000006B0000-0x00000000006BB000-memory.dmp

        Filesize

        44KB

      • memory/1160-27-0x00000000006B0000-0x00000000006BB000-memory.dmp

        Filesize

        44KB

      • memory/3244-12-0x0000000006670000-0x00000000066D8000-memory.dmp

        Filesize

        416KB

      • memory/3244-0-0x0000000074BEE000-0x0000000074BEF000-memory.dmp

        Filesize

        4KB

      • memory/3244-5-0x0000000074BE0000-0x0000000075390000-memory.dmp

        Filesize

        7.7MB

      • memory/3244-6-0x0000000074BE0000-0x0000000075390000-memory.dmp

        Filesize

        7.7MB

      • memory/3244-7-0x0000000074BE0000-0x0000000075390000-memory.dmp

        Filesize

        7.7MB

      • memory/3244-8-0x0000000008660000-0x00000000086FC000-memory.dmp

        Filesize

        624KB

      • memory/3244-9-0x00000000085D0000-0x00000000085DC000-memory.dmp

        Filesize

        48KB

      • memory/3244-10-0x0000000074BEE000-0x0000000074BEF000-memory.dmp

        Filesize

        4KB

      • memory/3244-11-0x0000000074BE0000-0x0000000075390000-memory.dmp

        Filesize

        7.7MB

      • memory/3244-3-0x00000000052E0000-0x0000000005372000-memory.dmp

        Filesize

        584KB

      • memory/3244-13-0x00000000066F0000-0x0000000006726000-memory.dmp

        Filesize

        216KB

      • memory/3244-4-0x0000000005230000-0x000000000523A000-memory.dmp

        Filesize

        40KB

      • memory/3244-16-0x0000000074BE0000-0x0000000075390000-memory.dmp

        Filesize

        7.7MB

      • memory/3244-1-0x0000000000820000-0x0000000000892000-memory.dmp

        Filesize

        456KB

      • memory/3244-2-0x0000000005890000-0x0000000005E34000-memory.dmp

        Filesize

        5.6MB

      • memory/3516-35-0x0000000003560000-0x0000000003636000-memory.dmp

        Filesize

        856KB

      • memory/3516-33-0x0000000003560000-0x0000000003636000-memory.dmp

        Filesize

        856KB

      • memory/3516-31-0x000000000AE90000-0x000000000AFD8000-memory.dmp

        Filesize

        1.3MB

      • memory/3516-29-0x0000000008730000-0x00000000088BA000-memory.dmp

        Filesize

        1.5MB

      • memory/3516-25-0x000000000AE90000-0x000000000AFD8000-memory.dmp

        Filesize

        1.3MB

      • memory/3516-21-0x0000000008730000-0x00000000088BA000-memory.dmp

        Filesize

        1.5MB

      • memory/3516-38-0x0000000003560000-0x0000000003636000-memory.dmp

        Filesize

        856KB

      • memory/4448-14-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4448-24-0x0000000000FE0000-0x0000000000FF5000-memory.dmp

        Filesize

        84KB

      • memory/4448-23-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4448-19-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4448-20-0x0000000000BC0000-0x0000000000BD5000-memory.dmp

        Filesize

        84KB

      • memory/4448-17-0x0000000001060000-0x00000000013AA000-memory.dmp

        Filesize

        3.3MB