Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-09-2024 12:48

General

  • Target

    f384ded729fd7bf92383bf1ee12b4e3da92fbb01ef0e9d84bf439ba70525210d.exe

  • Size

    457KB

  • MD5

    54ef2f2acdf62dfb40fc32aab1f46307

  • SHA1

    3f3640685b7af5b52a13d49cfd1cf5364114e317

  • SHA256

    f384ded729fd7bf92383bf1ee12b4e3da92fbb01ef0e9d84bf439ba70525210d

  • SHA512

    3ee12f2d99ce1ce272f99b7e190694f52aaf68bb2267f53efb6073d79100a3d127ad841bd9324d675af527e06bb9c56218ff1e91dfb644af1d21042cf049ff03

  • SSDEEP

    6144:MqTi59VJdaD70ylbBTpVg8DPmgQhSdj/4KngWIq6jRk+j:MGin670yTTpVg8CgcSKKngWIjX

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

h37

Decoy

misfitsbarandgrill.com

pijpsletjes.com

practiman.com

trailersgeek.online

greathappiness.faith

solderisland.com

kk5299.com

nani21.com

sharpactinvest.com

meteocockpit.com

provisionswpgroup.com

theplaze.net

westaustralian.ninja

freetrafficupgradingall.win

paraisocalafate.com

nelps.com

buywatch.win

sgfmim.site

mexicotradicional.com

moving411.biz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3396
    • C:\Users\Admin\AppData\Local\Temp\f384ded729fd7bf92383bf1ee12b4e3da92fbb01ef0e9d84bf439ba70525210d.exe
      "C:\Users\Admin\AppData\Local\Temp\f384ded729fd7bf92383bf1ee12b4e3da92fbb01ef0e9d84bf439ba70525210d.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\f384ded729fd7bf92383bf1ee12b4e3da92fbb01ef0e9d84bf439ba70525210d.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\app.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4376
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\System32\explorer.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\app.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4704
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\app.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1088
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\app.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\app.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\app.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\app.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\app.exe

    Filesize

    457KB

    MD5

    54ef2f2acdf62dfb40fc32aab1f46307

    SHA1

    3f3640685b7af5b52a13d49cfd1cf5364114e317

    SHA256

    f384ded729fd7bf92383bf1ee12b4e3da92fbb01ef0e9d84bf439ba70525210d

    SHA512

    3ee12f2d99ce1ce272f99b7e190694f52aaf68bb2267f53efb6073d79100a3d127ad841bd9324d675af527e06bb9c56218ff1e91dfb644af1d21042cf049ff03

  • memory/2128-14-0x0000000006330000-0x00000000063CC000-memory.dmp

    Filesize

    624KB

  • memory/3040-20-0x0000000000AB0000-0x0000000000AC4000-memory.dmp

    Filesize

    80KB

  • memory/3040-19-0x0000000000AB0000-0x0000000000AC4000-memory.dmp

    Filesize

    80KB

  • memory/3276-3-0x0000000005910000-0x00000000059A2000-memory.dmp

    Filesize

    584KB

  • memory/3276-5-0x0000000005800000-0x0000000005820000-memory.dmp

    Filesize

    128KB

  • memory/3276-6-0x000000007491E000-0x000000007491F000-memory.dmp

    Filesize

    4KB

  • memory/3276-7-0x0000000074910000-0x00000000750C0000-memory.dmp

    Filesize

    7.7MB

  • memory/3276-11-0x0000000074910000-0x00000000750C0000-memory.dmp

    Filesize

    7.7MB

  • memory/3276-4-0x0000000074910000-0x00000000750C0000-memory.dmp

    Filesize

    7.7MB

  • memory/3276-0-0x000000007491E000-0x000000007491F000-memory.dmp

    Filesize

    4KB

  • memory/3276-2-0x0000000005E20000-0x00000000063C4000-memory.dmp

    Filesize

    5.6MB

  • memory/3276-1-0x0000000000E10000-0x0000000000E88000-memory.dmp

    Filesize

    480KB

  • memory/3396-22-0x0000000009380000-0x000000000942D000-memory.dmp

    Filesize

    692KB

  • memory/3836-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB