Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 21:51

General

  • Target

    4d3cbcc07b14432bf98436ae31df7024dee670f6469f3aa5d0ebb0264d9900ad.exe

  • Size

    239KB

  • MD5

    54d01c526680d703fde81ea4e88d2265

  • SHA1

    fb0d0120fdff3292ae5a2563eb4a78b4a8a4e506

  • SHA256

    4d3cbcc07b14432bf98436ae31df7024dee670f6469f3aa5d0ebb0264d9900ad

  • SHA512

    b0235cc19723a9e938d758109c3036e955034d0ae0385d7f50985e3437cf2049530f0e1cf05c464ffefffd3c1028cbf098a42a4c464003faa88e8197dd6c5bfb

  • SSDEEP

    6144:cQqTsIO8SqRKElZ5E+CWP9RX7kdo2e8PaOmkYbgssVrht:ysrECu9lkdoMCbq

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

hdno

Decoy

tasteofsteak.com

lovedemingamerica.com

arizonaad.com

allbeautystation.com

theskinnybody.net

mywashbuddy.com

newspeak.watch

groomgarden.com

recommendproperty.com

pingshanhai.com

tianzeelectric.com

5335466.com

derbyescorts.com

quincyfreemannovels.com

ppeexchangeus.com

thesandcapital.com

natura.frl

twobonus.net

irx1.com

333lucky.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d3cbcc07b14432bf98436ae31df7024dee670f6469f3aa5d0ebb0264d9900ad.exe
    "C:\Users\Admin\AppData\Local\Temp\4d3cbcc07b14432bf98436ae31df7024dee670f6469f3aa5d0ebb0264d9900ad.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Users\Admin\AppData\Local\Temp\4d3cbcc07b14432bf98436ae31df7024dee670f6469f3aa5d0ebb0264d9900ad.exe
      "C:\Users\Admin\AppData\Local\Temp\4d3cbcc07b14432bf98436ae31df7024dee670f6469f3aa5d0ebb0264d9900ad.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsy99B1.tmp\System.dll

    Filesize

    11KB

    MD5

    fccff8cb7a1067e23fd2e2b63971a8e1

    SHA1

    30e2a9e137c1223a78a0f7b0bf96a1c361976d91

    SHA256

    6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e

    SHA512

    f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c

  • memory/2012-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2012-14-0x0000000000730000-0x0000000000A33000-memory.dmp

    Filesize

    3.0MB