Analysis

  • max time kernel
    144s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 21:30

General

  • Target

    vz7lgfephbs.exe

  • Size

    454KB

  • MD5

    78556723d290bbbeb1ed8c761861f8f8

  • SHA1

    8eaad367886c44e90962bc5c23ecdb16761031f1

  • SHA256

    1abe9c17071932ed40d00325752b433b244fd2410bb88d8fb2d194a2e5e3059e

  • SHA512

    0f17a1cc369ffc92b5a82e50e42edcc2a10736c838ae4cb12a9eeb46009ef7b744e7c92e52bb79a39506918df58545454fce734bbbeb676e48ddef27e4ed35c5

  • SSDEEP

    12288:39vAtRe9JF3Z7uSU2mgLb67ioQwL3eHjJS:3it4h9bQi8L2jJ

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

support

Decoy

acryingshame.info

aycicegiyapi.net

reserveyar.com

intiagri.com

brothersma.com

transparenzsiegel.net

waqa.ltd

montanafarmranches.com

victorysalesandmarketing.net

tintoy.net

checkfixtures.com

jdoeworld.com

acuvueonline.com

hhpphz.com

wszcjt.com

pettreats.pet

jbellamyhomes.com

ht61laju26h.biz

basilmoters.com

pollyannalabs.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\vz7lgfephbs.exe
      "C:\Users\Admin\AppData\Local\Temp\vz7lgfephbs.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Users\Admin\AppData\Local\Temp\vz7lgfephbs.exe
        "C:\Users\Admin\AppData\Local\Temp\vz7lgfephbs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1200-10-0x0000000003E00000-0x0000000004000000-memory.dmp

    Filesize

    2.0MB

  • memory/1200-21-0x000007FEF6CC0000-0x000007FEF6E03000-memory.dmp

    Filesize

    1.3MB

  • memory/1200-20-0x000007FEF6DD7000-0x000007FEF6DF5000-memory.dmp

    Filesize

    120KB

  • memory/1200-19-0x000007FEF6CC0000-0x000007FEF6E03000-memory.dmp

    Filesize

    1.3MB

  • memory/1200-18-0x000007FEF6DD7000-0x000007FEF6DF5000-memory.dmp

    Filesize

    120KB

  • memory/1200-17-0x00000000066C0000-0x000000000686E000-memory.dmp

    Filesize

    1.7MB

  • memory/1200-8-0x00000000051D0000-0x0000000005324000-memory.dmp

    Filesize

    1.3MB

  • memory/1200-7-0x0000000003E00000-0x0000000004000000-memory.dmp

    Filesize

    2.0MB

  • memory/1200-16-0x00000000051D0000-0x0000000005324000-memory.dmp

    Filesize

    1.3MB

  • memory/1200-12-0x00000000066C0000-0x000000000686E000-memory.dmp

    Filesize

    1.7MB

  • memory/1420-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1420-6-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1420-2-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2100-0-0x0000000000400000-0x0000000000C72000-memory.dmp

    Filesize

    8.4MB

  • memory/2100-3-0x0000000000230000-0x0000000000244000-memory.dmp

    Filesize

    80KB

  • memory/2100-4-0x0000000077BE0000-0x0000000077CB6000-memory.dmp

    Filesize

    856KB

  • memory/2100-1-0x0000000000230000-0x0000000000244000-memory.dmp

    Filesize

    80KB