Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-08-2024 18:27

General

  • Target

    7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861.exe

  • Size

    1.1MB

  • MD5

    b0896ccaf97625a546e53df07bb98769

  • SHA1

    39d66b58804ff0f1b600b910713118041f0ddd4b

  • SHA256

    7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861

  • SHA512

    2aa7ead5dd4ef225acecd4d56d1735b7041e1e772e5c82f177561638d262daeff4aca86c14a1b1bcaef5d4cf538d65b3bd0d5842a3382559d7727a379f74e50f

  • SSDEEP

    24576:1qDEvCTbMWu7rQYlBQcBiT6rprG8acGCRB5I89:1TvC/MTQYxsWR7acjp

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

cn14

Decoy

fgfdwr254u.xyz

arm-uk.com

qoachu.com

radiantpm.christmas

ghacor.delivery

lindasartgmbh.com

agroguasch.com

silverlinedevelopment.net

1000thb.com

bremwq.xyz

qweuiop.top

dental-implants-21860.bond

elotesaguafria.com

biagiottifraticelli.com

pureleafworks.com

mokomusic.com

lunarqr.shop

bestbuyprods.com

michaelsec.com

morganstore.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of UnmapMainImage
    PID:3504
    • C:\Users\Admin\AppData\Local\Temp\7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861.exe
      "C:\Users\Admin\AppData\Local\Temp\7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2608
        • C:\Windows\SysWOW64\chkdsk.exe
          "C:\Windows\SysWOW64\chkdsk.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3588
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Windows\SysWOW64\svchost.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:5068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2608-19-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2608-12-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2608-13-0x0000000001700000-0x0000000001A4A000-memory.dmp

    Filesize

    3.3MB

  • memory/2608-16-0x0000000001A70000-0x0000000001A84000-memory.dmp

    Filesize

    80KB

  • memory/2608-15-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2608-20-0x0000000001AD0000-0x0000000001AE4000-memory.dmp

    Filesize

    80KB

  • memory/3068-11-0x0000000001F00000-0x0000000001F04000-memory.dmp

    Filesize

    16KB

  • memory/3504-21-0x0000000003100000-0x00000000032A1000-memory.dmp

    Filesize

    1.6MB

  • memory/3504-17-0x000000000AE30000-0x000000000AF5A000-memory.dmp

    Filesize

    1.2MB

  • memory/3504-25-0x000000000AE30000-0x000000000AF5A000-memory.dmp

    Filesize

    1.2MB

  • memory/3504-27-0x0000000003100000-0x00000000032A1000-memory.dmp

    Filesize

    1.6MB

  • memory/3504-29-0x0000000008E40000-0x0000000008F90000-memory.dmp

    Filesize

    1.3MB

  • memory/3504-30-0x0000000008E40000-0x0000000008F90000-memory.dmp

    Filesize

    1.3MB

  • memory/3504-33-0x0000000008E40000-0x0000000008F90000-memory.dmp

    Filesize

    1.3MB

  • memory/3588-22-0x0000000000570000-0x000000000057A000-memory.dmp

    Filesize

    40KB

  • memory/3588-23-0x0000000000570000-0x000000000057A000-memory.dmp

    Filesize

    40KB

  • memory/3588-24-0x0000000000B80000-0x0000000000BAF000-memory.dmp

    Filesize

    188KB