Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-08-2024 13:53

General

  • Target

    Inquiry pdf.exe

  • Size

    517KB

  • MD5

    cb03eb5391971119bf6f81acbb84e1bc

  • SHA1

    b5f050d050f9af0b4d937514935854c4e52f3eb6

  • SHA256

    cddf575d340c695e513d03330965f716f8ddf17f5d2fb0929fbb78875653d8b7

  • SHA512

    d654710622e0781d4119f894a9ab6677a72b20ef2c4d3784aeaf4dcd34b47e2861008be15d3a8d474b8b6b82b395a337f14b05ec470433fd8d8d694315b6d8b1

  • SSDEEP

    6144:HBzy0/iei9k8mOalFu027X1mKjlpBFR+HPdroDJ8t3T7UmhCCT3dIPSH6MKghy03:PZi9704x/mHJoyx7Lhr/zDEuua+/o

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

bft

Decoy

edenicities.com

buntingfordhomeservices.com

nuanceproducoes.com

divasinspire.com

capiturn.com

zbjsn.com

thegioicaytrongnha.com

featherventure.com

onbrandtrading.com

sanguoban.com

doorman.pro

ourhomie.net

iwassickonholiday.com

mrcskin.com

reallycoolmask.com

tkrbeautyinstitut.com

keytomiami.com

sesliduybeni.com

asherwebber.com

starkweatherwindows.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Users\Admin\AppData\Local\Temp\Inquiry pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\Inquiry pdf.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3164
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UpCsvUUWV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5FAF.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:4508
      • C:\Users\Admin\AppData\Local\Temp\Inquiry pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\Inquiry pdf.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4376
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4716
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Inquiry pdf.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp5FAF.tmp

    Filesize

    1KB

    MD5

    9ae81ad8208cadaf5e7c6334f69ce81e

    SHA1

    d87c378c7ddad0ebfa44666d2b9d6b285fb98ffe

    SHA256

    bbdc25877f44347467ed0546918fa2dbe2bde6554cdf7de9c225c19cb3a8c9f6

    SHA512

    72fa0522cadb4d5365c60098ef10b1f1d46db79c59f4d42fd146687a1b1ce4e950e9cfadad5784798f1b1442074b9a09b02f3444a510ba06505fd174c4ce0221

  • memory/3164-6-0x00000000051A0000-0x00000000051F6000-memory.dmp

    Filesize

    344KB

  • memory/3164-19-0x0000000074480000-0x0000000074C30000-memory.dmp

    Filesize

    7.7MB

  • memory/3164-3-0x0000000005500000-0x0000000005AA4000-memory.dmp

    Filesize

    5.6MB

  • memory/3164-4-0x0000000004FF0000-0x0000000005082000-memory.dmp

    Filesize

    584KB

  • memory/3164-5-0x0000000004F60000-0x0000000004F6A000-memory.dmp

    Filesize

    40KB

  • memory/3164-0-0x000000007448E000-0x000000007448F000-memory.dmp

    Filesize

    4KB

  • memory/3164-7-0x0000000074480000-0x0000000074C30000-memory.dmp

    Filesize

    7.7MB

  • memory/3164-8-0x00000000052A0000-0x00000000052AA000-memory.dmp

    Filesize

    40KB

  • memory/3164-9-0x000000007448E000-0x000000007448F000-memory.dmp

    Filesize

    4KB

  • memory/3164-10-0x0000000074480000-0x0000000074C30000-memory.dmp

    Filesize

    7.7MB

  • memory/3164-11-0x0000000000E30000-0x0000000000E92000-memory.dmp

    Filesize

    392KB

  • memory/3164-2-0x0000000004EB0000-0x0000000004F4C000-memory.dmp

    Filesize

    624KB

  • memory/3164-1-0x0000000000440000-0x00000000004C8000-memory.dmp

    Filesize

    544KB

  • memory/3516-31-0x0000000004170000-0x0000000004274000-memory.dmp

    Filesize

    1.0MB

  • memory/3516-24-0x0000000002840000-0x000000000293B000-memory.dmp

    Filesize

    1004KB

  • memory/3516-27-0x0000000002840000-0x000000000293B000-memory.dmp

    Filesize

    1004KB

  • memory/3516-32-0x0000000004170000-0x0000000004274000-memory.dmp

    Filesize

    1.0MB

  • memory/3516-34-0x0000000004170000-0x0000000004274000-memory.dmp

    Filesize

    1.0MB

  • memory/4376-17-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4376-22-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4376-23-0x0000000001350000-0x0000000001364000-memory.dmp

    Filesize

    80KB

  • memory/4376-20-0x0000000000EE0000-0x000000000122A000-memory.dmp

    Filesize

    3.3MB

  • memory/4716-25-0x0000000000200000-0x000000000020C000-memory.dmp

    Filesize

    48KB

  • memory/4716-26-0x0000000000200000-0x000000000020C000-memory.dmp

    Filesize

    48KB