Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-08-2024 21:30

General

  • Target

    vz7lgfephbs.exe

  • Size

    454KB

  • MD5

    78556723d290bbbeb1ed8c761861f8f8

  • SHA1

    8eaad367886c44e90962bc5c23ecdb16761031f1

  • SHA256

    1abe9c17071932ed40d00325752b433b244fd2410bb88d8fb2d194a2e5e3059e

  • SHA512

    0f17a1cc369ffc92b5a82e50e42edcc2a10736c838ae4cb12a9eeb46009ef7b744e7c92e52bb79a39506918df58545454fce734bbbeb676e48ddef27e4ed35c5

  • SSDEEP

    12288:39vAtRe9JF3Z7uSU2mgLb67ioQwL3eHjJS:3it4h9bQi8L2jJ

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

support

Decoy

acryingshame.info

aycicegiyapi.net

reserveyar.com

intiagri.com

brothersma.com

transparenzsiegel.net

waqa.ltd

montanafarmranches.com

victorysalesandmarketing.net

tintoy.net

checkfixtures.com

jdoeworld.com

acuvueonline.com

hhpphz.com

wszcjt.com

pettreats.pet

jbellamyhomes.com

ht61laju26h.biz

basilmoters.com

pollyannalabs.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Formbook payload 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\vz7lgfephbs.exe
      "C:\Users\Admin\AppData\Local\Temp\vz7lgfephbs.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Users\Admin\AppData\Local\Temp\vz7lgfephbs.exe
        "C:\Users\Admin\AppData\Local\Temp\vz7lgfephbs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2684
    • C:\Windows\SysWOW64\systray.exe
      "C:\Windows\SysWOW64\systray.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4376
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\vz7lgfephbs.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4524
      • C:\Windows\SysWOW64\cmd.exe
        /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
        3⤵
        • System Location Discovery: System Language Discovery
        PID:924
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:2040

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\DB1

      Filesize

      46KB

      MD5

      02d2c46697e3714e49f46b680b9a6b83

      SHA1

      84f98b56d49f01e9b6b76a4e21accf64fd319140

      SHA256

      522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

      SHA512

      60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

    • C:\Users\Admin\AppData\Roaming\8LPNS5AW\8LPlogim.jpeg

      Filesize

      71KB

      MD5

      6d65d0ea6d61843c70008283fd118b67

      SHA1

      5e637a78fdac3c63880b493bd161c431613b76fc

      SHA256

      63e2d2e3dc5e8b16975708486575897eae480884077dc59645db45c2cf3fd2fe

      SHA512

      f327da97d4481799771d9f062c872ac2ff3074c1caf0df2c75aee887f2a659c0c620f2f2e32750cd8790db9ee0dc2b8ce6e5b143110227b42af9b400ef38f79a

    • C:\Users\Admin\AppData\Roaming\8LPNS5AW\8LPlogrf.ini

      Filesize

      40B

      MD5

      2f245469795b865bdd1b956c23d7893d

      SHA1

      6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

      SHA256

      1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

      SHA512

      909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

    • C:\Users\Admin\AppData\Roaming\8LPNS5AW\8LPlogrg.ini

      Filesize

      38B

      MD5

      4aadf49fed30e4c9b3fe4a3dd6445ebe

      SHA1

      1e332822167c6f351b99615eada2c30a538ff037

      SHA256

      75034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56

      SHA512

      eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945

    • C:\Users\Admin\AppData\Roaming\8LPNS5AW\8LPlogri.ini

      Filesize

      40B

      MD5

      d63a82e5d81e02e399090af26db0b9cb

      SHA1

      91d0014c8f54743bba141fd60c9d963f869d76c9

      SHA256

      eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

      SHA512

      38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

    • C:\Users\Admin\AppData\Roaming\8LPNS5AW\8LPlogrv.ini

      Filesize

      40B

      MD5

      ba3b6bc807d4f76794c4b81b09bb9ba5

      SHA1

      24cb89501f0212ff3095ecc0aba97dd563718fb1

      SHA256

      6eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507

      SHA512

      ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf

    • C:\Users\Admin\AppData\Roaming\8LPNS5AW\8LPlogrv.ini

      Filesize

      1KB

      MD5

      4c134e9c4f9d52f784a1479ddcc02cf9

      SHA1

      a54862aaaba04cf75ac3f454aa752b7ceda43b6f

      SHA256

      11b6714d6fbd36817360fa73ed74c8592ce7c00ba821016443ca27447023d1bd

      SHA512

      3eabced04bf936c56df7868428258f8b62646e1c431c8d9cb9c2d1cdfb28a330836238819873375f85d4002efb475e44f7a45a3e5e3a4624c172769073dd3a0d

    • memory/1988-1-0x0000000000DE0000-0x0000000000DF4000-memory.dmp

      Filesize

      80KB

    • memory/1988-2-0x0000000077AA1000-0x0000000077BB4000-memory.dmp

      Filesize

      1.1MB

    • memory/1988-4-0x0000000000DE0000-0x0000000000DF4000-memory.dmp

      Filesize

      80KB

    • memory/1988-5-0x0000000000400000-0x0000000000C72000-memory.dmp

      Filesize

      8.4MB

    • memory/1988-0-0x0000000000400000-0x0000000000C72000-memory.dmp

      Filesize

      8.4MB

    • memory/2684-3-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2684-7-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3444-22-0x0000000005020000-0x0000000005187000-memory.dmp

      Filesize

      1.4MB

    • memory/3444-23-0x0000000005020000-0x0000000005187000-memory.dmp

      Filesize

      1.4MB

    • memory/3444-18-0x0000000002AD0000-0x0000000002B82000-memory.dmp

      Filesize

      712KB

    • memory/3444-45-0x0000000005020000-0x0000000005187000-memory.dmp

      Filesize

      1.4MB

    • memory/3444-8-0x0000000002AD0000-0x0000000002B82000-memory.dmp

      Filesize

      712KB

    • memory/4376-15-0x00000000008A0000-0x00000000008CE000-memory.dmp

      Filesize

      184KB

    • memory/4376-11-0x0000000000A00000-0x0000000000A06000-memory.dmp

      Filesize

      24KB

    • memory/4376-12-0x0000000000A00000-0x0000000000A06000-memory.dmp

      Filesize

      24KB

    • memory/4376-14-0x0000000000A00000-0x0000000000A06000-memory.dmp

      Filesize

      24KB