Analysis

  • max time kernel
    146s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2024 08:05

General

  • Target

    საბანკო გადარიცხვა pdf.exe

  • Size

    607KB

  • MD5

    f1b6c28862601615ed112a7d9fe4c522

  • SHA1

    f6c57de91d90ab459c003264979f3200796cf1b7

  • SHA256

    f27ca1ef4a89fb6d40bf7af8c8d31b3518883aee77d4fd0ce07279ad4699852b

  • SHA512

    2d4e1c7bcf60d3a085aaa471ac017febd6b0a899faa92b9b18bcb18c136f392809027f58b2c96512b3713da837cf7a4617026aa63e830b7b8e82ac26cbc67fec

  • SSDEEP

    12288:T4+13cDx3lNnuTjMmHZ9cMy7RY+9cJkf4OJFBsPaRtC:si+LNnAry7RY9Y4O7SD

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

gy15

Decoy

yb40w.top

286live.com

poozonlife.com

availableweedsonline.com

22926839.com

petlovepet.fun

halbaexpress.com

newswingbd.com

discountdesh.com

jwoalhbn.xyz

dandevonald.com

incrediblyxb.christmas

ailia.pro

ga3ki3.com

99812.photos

richiecom.net

ummahskills.online

peakleyva.store

a1cbloodtest.com

insurancebygarry.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Users\Admin\AppData\Local\Temp\საბანკო გადარიცხვა pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\საბანკო გადარიცხვა pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vAynSWQKBkHb.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2148
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vAynSWQKBkHb" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD920.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2192
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2944
    • C:\Windows\SysWOW64\NAPSTAT.EXE
      "C:\Windows\SysWOW64\NAPSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpD920.tmp

    Filesize

    1KB

    MD5

    cb7e5decd46005bc1658a81ca5c603d0

    SHA1

    25c23fbd39b1602dfeb3f694789b7102fff295ab

    SHA256

    632a3ee987bb230b3d417a1d6d261856b72467c75063800ea75f61e261350647

    SHA512

    6ed2071b24d3e8e15ae1aaf4fc0bd2539848f1bfe237d3d723c47ad069efb621d715d2d7603c79a7fcef8c6b2c88141377b685093e0179965d1e384ae6623b22

  • memory/1644-3-0x00000000005D0000-0x00000000005EE000-memory.dmp

    Filesize

    120KB

  • memory/1644-2-0x0000000074710000-0x0000000074DFE000-memory.dmp

    Filesize

    6.9MB

  • memory/1644-0-0x000000007471E000-0x000000007471F000-memory.dmp

    Filesize

    4KB

  • memory/1644-4-0x0000000001DA0000-0x0000000001DB6000-memory.dmp

    Filesize

    88KB

  • memory/1644-5-0x0000000005060000-0x00000000050D6000-memory.dmp

    Filesize

    472KB

  • memory/1644-1-0x00000000003C0000-0x000000000045E000-memory.dmp

    Filesize

    632KB

  • memory/1644-19-0x0000000074710000-0x0000000074DFE000-memory.dmp

    Filesize

    6.9MB

  • memory/1956-21-0x00000000008F0000-0x0000000000936000-memory.dmp

    Filesize

    280KB

  • memory/1956-22-0x0000000000080000-0x00000000000AF000-memory.dmp

    Filesize

    188KB

  • memory/2944-11-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2944-16-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2944-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2944-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB