Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 02:14

General

  • Target

    a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe

  • Size

    651KB

  • MD5

    622fec48546a83b6c146074a7c6de40d

  • SHA1

    3cc90d360795455fa69b6bf12ccf36ae0e09106e

  • SHA256

    a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae

  • SHA512

    fe3048d55396bfea180146a37225cd42f8bcc21cf56cec063f02fb5a48b52bf9f316a072adb6733fc52488b21987d4f19b0262010cc1caa803343785892bed04

  • SSDEEP

    12288:3tJ6BgKTNRh02gF64s3leiYpIRsLI4L0i/xgQnrQstn8CMEaSLIMz+t:3tJofHgF83siW04L0i/xgKftn8CMEpLy

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

de94

Decoy

gx899.top

whoistommy.info

vabex.shop

vduwum.rest

betbox2351.com

ch3kat0.online

kaduexpress.com

sibonline.shop

bt365918.com

betterlabs.app

denversandandgravel.net

webzlp.xyz

tdodtn263q.xyz

zamaninvest.com

vcxwpo.xyz

myastrolyfe.com

lsm8v87jnkrqcnr.buzz

ilregnodellecozze.com

auroraskynholistics.com

sewassist.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe
    "C:\Users\Admin\AppData\Local\Temp\a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Users\Admin\AppData\Local\Temp\a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe
      "C:\Users\Admin\AppData\Local\Temp\a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 36
        3⤵
        • Program crash
        PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2140-7-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2140-11-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2140-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2140-8-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2968-0-0x0000000073ECE000-0x0000000073ECF000-memory.dmp

    Filesize

    4KB

  • memory/2968-1-0x0000000000240000-0x00000000002E8000-memory.dmp

    Filesize

    672KB

  • memory/2968-2-0x0000000073EC0000-0x00000000745AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2968-3-0x0000000000550000-0x0000000000562000-memory.dmp

    Filesize

    72KB

  • memory/2968-4-0x0000000000560000-0x000000000056E000-memory.dmp

    Filesize

    56KB

  • memory/2968-5-0x00000000051D0000-0x0000000005246000-memory.dmp

    Filesize

    472KB

  • memory/2968-12-0x0000000073EC0000-0x00000000745AE000-memory.dmp

    Filesize

    6.9MB