Analysis

  • max time kernel
    147s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 12:48

General

  • Target

    f384ded729fd7bf92383bf1ee12b4e3da92fbb01ef0e9d84bf439ba70525210d.exe

  • Size

    457KB

  • MD5

    54ef2f2acdf62dfb40fc32aab1f46307

  • SHA1

    3f3640685b7af5b52a13d49cfd1cf5364114e317

  • SHA256

    f384ded729fd7bf92383bf1ee12b4e3da92fbb01ef0e9d84bf439ba70525210d

  • SHA512

    3ee12f2d99ce1ce272f99b7e190694f52aaf68bb2267f53efb6073d79100a3d127ad841bd9324d675af527e06bb9c56218ff1e91dfb644af1d21042cf049ff03

  • SSDEEP

    6144:MqTi59VJdaD70ylbBTpVg8DPmgQhSdj/4KngWIq6jRk+j:MGin670yTTpVg8CgcSKKngWIjX

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

h37

Decoy

misfitsbarandgrill.com

pijpsletjes.com

practiman.com

trailersgeek.online

greathappiness.faith

solderisland.com

kk5299.com

nani21.com

sharpactinvest.com

meteocockpit.com

provisionswpgroup.com

theplaze.net

westaustralian.ninja

freetrafficupgradingall.win

paraisocalafate.com

nelps.com

buywatch.win

sgfmim.site

mexicotradicional.com

moving411.biz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Users\Admin\AppData\Local\Temp\f384ded729fd7bf92383bf1ee12b4e3da92fbb01ef0e9d84bf439ba70525210d.exe
      "C:\Users\Admin\AppData\Local\Temp\f384ded729fd7bf92383bf1ee12b4e3da92fbb01ef0e9d84bf439ba70525210d.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\f384ded729fd7bf92383bf1ee12b4e3da92fbb01ef0e9d84bf439ba70525210d.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\app.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2660
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\System32\explorer.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\app.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2592
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\app.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1012
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\app.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\app.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\app.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\app.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\app.exe

    Filesize

    457KB

    MD5

    54ef2f2acdf62dfb40fc32aab1f46307

    SHA1

    3f3640685b7af5b52a13d49cfd1cf5364114e317

    SHA256

    f384ded729fd7bf92383bf1ee12b4e3da92fbb01ef0e9d84bf439ba70525210d

    SHA512

    3ee12f2d99ce1ce272f99b7e190694f52aaf68bb2267f53efb6073d79100a3d127ad841bd9324d675af527e06bb9c56218ff1e91dfb644af1d21042cf049ff03

  • memory/1244-17-0x00000000074E0000-0x0000000007680000-memory.dmp

    Filesize

    1.6MB

  • memory/1528-10-0x0000000000FF0000-0x0000000001068000-memory.dmp

    Filesize

    480KB

  • memory/2132-3-0x00000000003F0000-0x0000000000410000-memory.dmp

    Filesize

    128KB

  • memory/2132-4-0x0000000074210000-0x00000000748FE000-memory.dmp

    Filesize

    6.9MB

  • memory/2132-7-0x0000000074210000-0x00000000748FE000-memory.dmp

    Filesize

    6.9MB

  • memory/2132-0-0x000000007421E000-0x000000007421F000-memory.dmp

    Filesize

    4KB

  • memory/2132-2-0x0000000074210000-0x00000000748FE000-memory.dmp

    Filesize

    6.9MB

  • memory/2132-1-0x0000000000810000-0x0000000000888000-memory.dmp

    Filesize

    480KB

  • memory/2444-18-0x00000000001A0000-0x0000000000294000-memory.dmp

    Filesize

    976KB

  • memory/2616-13-0x0000000000080000-0x00000000000AA000-memory.dmp

    Filesize

    168KB

  • memory/2616-15-0x0000000000080000-0x00000000000AA000-memory.dmp

    Filesize

    168KB

  • memory/2616-16-0x0000000000080000-0x00000000000AA000-memory.dmp

    Filesize

    168KB