Analysis

  • max time kernel
    147s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 04:50

General

  • Target

    9b5f439bf7b59558b0b4dea2c1c387de8bd122fb2f91692030004ebeb24ab808.exe

  • Size

    1.0MB

  • MD5

    fc65a875fe7b3e5e9a0fab7050c12b6b

  • SHA1

    0575feacb643c76b0e6754181a6f7620142cbe14

  • SHA256

    9b5f439bf7b59558b0b4dea2c1c387de8bd122fb2f91692030004ebeb24ab808

  • SHA512

    3e5c24e9ca8855d8f03c44e53d2d4bf9b97ad951b4c6bcd659dc7cd858e27ac0cfe601a8fccbfad56a3fab330472149e6cd443e20657a01f48d722ffd35c7765

  • SSDEEP

    24576:7AHnh+eWsN3skA4RV1Hom2KXMmHaqZQ108KTvrtsHG25:Wh+ZkldoPK8YaqZQ1084rID

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

pt46

Decoy

twinportslocal.com

rovor.store

98169.club

mdywl.com

jrd3s.rest

aston1717.top

floridawoodworkingmachinery.com

17tk555t.com

ankitsho.shop

seclameh.com

realrecordlabel.com

trenchonbirmingham.com

af28.top

rtp1kenzototo.com

theselflovesite.com

promotegetpaid.info

strategiclogisticsagency.com

learneracademy.net

per-watch.com

betbox2341.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Users\Admin\AppData\Local\Temp\9b5f439bf7b59558b0b4dea2c1c387de8bd122fb2f91692030004ebeb24ab808.exe
      "C:\Users\Admin\AppData\Local\Temp\9b5f439bf7b59558b0b4dea2c1c387de8bd122fb2f91692030004ebeb24ab808.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\9b5f439bf7b59558b0b4dea2c1c387de8bd122fb2f91692030004ebeb24ab808.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:580
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\svchost.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/580-11-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/580-16-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/580-13-0x0000000000950000-0x0000000000C53000-memory.dmp

    Filesize

    3.0MB

  • memory/580-15-0x0000000000190000-0x00000000001A4000-memory.dmp

    Filesize

    80KB

  • memory/1168-14-0x0000000004490000-0x0000000004690000-memory.dmp

    Filesize

    2.0MB

  • memory/1168-17-0x00000000050A0000-0x0000000005205000-memory.dmp

    Filesize

    1.4MB

  • memory/1168-23-0x00000000050A0000-0x0000000005205000-memory.dmp

    Filesize

    1.4MB

  • memory/2472-18-0x0000000000B70000-0x0000000000B7D000-memory.dmp

    Filesize

    52KB

  • memory/2472-19-0x0000000000B70000-0x0000000000B7D000-memory.dmp

    Filesize

    52KB

  • memory/2472-20-0x0000000000080000-0x00000000000AF000-memory.dmp

    Filesize

    188KB

  • memory/2580-10-0x0000000000120000-0x0000000000124000-memory.dmp

    Filesize

    16KB