Analysis

  • max time kernel
    1800s
  • max time network
    1803s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 18:59

General

  • Target

    COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe

  • Size

    1.1MB

  • MD5

    5ec011058b0884bc3b13563f97231c58

  • SHA1

    9846a460d630ea60c476df6dc92ae10d902bb54f

  • SHA256

    bc5a7642799c2f22d513dc19fb87848ecbe002f1815b2d5fd3a5af3fdbcdf0ae

  • SHA512

    d3172fe1fc90a3e8e4331bb4eeae03377825e26a815636c8931890fa9c1f8290eafa8c293e22b218d37f79a9202e62c5a5b13df40a14ebb828814a3797262523

  • SSDEEP

    24576:gqDEvCTbMWu7rQYlBQcBiT6rprG8apamXjozThdab7:gTvC/MTQYxsWR7ap7wn

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

jd21

Decoy

thepowerofzeus.com

tampamlr.com

00050591.xyz

dominomusicmktlnc.com

ai-defi.wiki

tyumk.xyz

gbqspj.club

fostertv.net

batremake.com

nelwhiteconsulting.com

amsya.com

urbanholidayz.com

463058.photos

anag-gioielli.com

kjsdhklssk73.xyz

islarenta.com

designed4lifecoaching.com

autohotelsecrets.com

susansellsmarin.com

studyflow.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Formbook payload 4 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
      "C:\Users\Admin\AppData\Local\Temp\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:336
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:2248
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:2240
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:2568
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:2848
            • C:\Windows\SysWOW64\cmstp.exe
              "C:\Windows\SysWOW64\cmstp.exe"
              2⤵
              • Adds policy Run key to start application
              • Suspicious use of SetThreadContext
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:1304
              • C:\Windows\SysWOW64\cmd.exe
                /c del "C:\Windows\SysWOW64\svchost.exe"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:2416
              • C:\Program Files\Mozilla Firefox\Firefox.exe
                "C:\Program Files\Mozilla Firefox\Firefox.exe"
                3⤵
                  PID:2936

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\L24RB9SB\L24logim.jpeg

              Filesize

              63KB

              MD5

              37818fa17171659a03be9fbb22487b37

              SHA1

              ddc35214a182abd1d2f379e3894804323ab7f744

              SHA256

              2ec6140be122c60f2a702412f36ae2c692d70a6b50f8830a97638199b4da55fd

              SHA512

              6272f99df4757f4208ff64d104916f936b8ef4cc044acb9fa0378ba0a70b29ac832f677952339cae052e4fee9e7a561527a445245a9a283da11dbdf7f78fd854

            • C:\Users\Admin\AppData\Roaming\L24RB9SB\L24logrf.ini

              Filesize

              40B

              MD5

              2f245469795b865bdd1b956c23d7893d

              SHA1

              6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

              SHA256

              1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

              SHA512

              909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

            • C:\Users\Admin\AppData\Roaming\L24RB9SB\L24logri.ini

              Filesize

              40B

              MD5

              d63a82e5d81e02e399090af26db0b9cb

              SHA1

              91d0014c8f54743bba141fd60c9d963f869d76c9

              SHA256

              eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

              SHA512

              38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

            • C:\Users\Admin\AppData\Roaming\L24RB9SB\L24logrv.ini

              Filesize

              40B

              MD5

              ba3b6bc807d4f76794c4b81b09bb9ba5

              SHA1

              24cb89501f0212ff3095ecc0aba97dd563718fb1

              SHA256

              6eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507

              SHA512

              ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf

            • memory/336-11-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/336-13-0x0000000000880000-0x0000000000B83000-memory.dmp

              Filesize

              3.0MB

            • memory/336-15-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/336-14-0x00000000001D0000-0x00000000001E5000-memory.dmp

              Filesize

              84KB

            • memory/336-19-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/336-20-0x0000000000220000-0x0000000000235000-memory.dmp

              Filesize

              84KB

            • memory/1204-32-0x0000000006EC0000-0x0000000007012000-memory.dmp

              Filesize

              1.3MB

            • memory/1204-28-0x00000000066E0000-0x000000000687C000-memory.dmp

              Filesize

              1.6MB

            • memory/1204-29-0x0000000005080000-0x0000000005176000-memory.dmp

              Filesize

              984KB

            • memory/1204-34-0x0000000006EC0000-0x0000000007012000-memory.dmp

              Filesize

              1.3MB

            • memory/1204-37-0x0000000006EC0000-0x0000000007012000-memory.dmp

              Filesize

              1.3MB

            • memory/1204-21-0x0000000005080000-0x0000000005176000-memory.dmp

              Filesize

              984KB

            • memory/1204-17-0x00000000066E0000-0x000000000687C000-memory.dmp

              Filesize

              1.6MB

            • memory/1204-16-0x0000000000010000-0x0000000000020000-memory.dmp

              Filesize

              64KB

            • memory/1304-22-0x0000000000950000-0x0000000000968000-memory.dmp

              Filesize

              96KB

            • memory/1304-25-0x0000000000090000-0x00000000000BF000-memory.dmp

              Filesize

              188KB

            • memory/1304-24-0x0000000000950000-0x0000000000968000-memory.dmp

              Filesize

              96KB

            • memory/1716-10-0x0000000000120000-0x0000000000124000-memory.dmp

              Filesize

              16KB