Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 14:05

General

  • Target

    ORDEN_04.09.2024 DON LAFFAN.pdf.exe

  • Size

    1.2MB

  • MD5

    4fe114deb063606d6786cc3d0390174f

  • SHA1

    7dd471d40977da29e0d1b00394ef82cbe33766d2

  • SHA256

    0d7511007c8c1e3b7dacf41792a9307b71504c33bdcfa78367384475e2fa7cb3

  • SHA512

    68e1267e48bb55bfcaeabca144c2fc43d21173359157b31359db49ddf3144d97f1ddbca442f4e5af9c984c6641d7e18014604a69b29ee6f7378184bb2d3aa95c

  • SSDEEP

    24576:LAHnh+eWsN3skA4RV1Hom2KXMmHajnpfF2WIB6Eluhh5:mh+ZkldoPK8YajnlcB6V

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

rn94

Decoy

st68v.xyz

conciergenotary.net

qwechaotk.top

rtpdonatoto29.xyz

8ad.xyz

powermove.top

cameras-30514.bond

vanguardcoffee.shop

umoe53fxc1bsujv.buzz

consultoriamax.net

hplxx.com

ndu.wtf

yzh478c.xyz

bigbrown999.site

xiake07.asia

resdai.xyz

the35678.shop

ba6rf.rest

ceo688.com

phimxhot.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Users\Admin\AppData\Local\Temp\ORDEN_04.09.2024 DON LAFFAN.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\ORDEN_04.09.2024 DON LAFFAN.pdf.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Users\Admin\AppData\Local\directory\name.exe
        "C:\Users\Admin\AppData\Local\Temp\ORDEN_04.09.2024 DON LAFFAN.pdf.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\ORDEN_04.09.2024 DON LAFFAN.pdf.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2568
    • C:\Windows\SysWOW64\wuapp.exe
      "C:\Windows\SysWOW64\wuapp.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\svchost.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Dunlop

    Filesize

    203KB

    MD5

    390c711bcd07298a6bf36805e3902d49

    SHA1

    f6b118de4b3d201610502bbfbd6740d6a9c55e52

    SHA256

    71aa4e38c636da626fc879b842824e2ec4387c9a619174e876dc8b26389e4f3a

    SHA512

    777c73944fa10483dbb1fbe286b05f398f5a61f882f4c9ff36a57f5019e9768a6fc0016c1ec5682791e06e778451aa947b4038da2d22c893b8bc30d6d00f4743

  • \Users\Admin\AppData\Local\directory\name.exe

    Filesize

    1.2MB

    MD5

    4fe114deb063606d6786cc3d0390174f

    SHA1

    7dd471d40977da29e0d1b00394ef82cbe33766d2

    SHA256

    0d7511007c8c1e3b7dacf41792a9307b71504c33bdcfa78367384475e2fa7cb3

    SHA512

    68e1267e48bb55bfcaeabca144c2fc43d21173359157b31359db49ddf3144d97f1ddbca442f4e5af9c984c6641d7e18014604a69b29ee6f7378184bb2d3aa95c

  • memory/1188-41-0x0000000004F60000-0x00000000050D9000-memory.dmp

    Filesize

    1.5MB

  • memory/1188-37-0x0000000004F60000-0x00000000050D9000-memory.dmp

    Filesize

    1.5MB

  • memory/1188-47-0x00000000051B0000-0x0000000005269000-memory.dmp

    Filesize

    740KB

  • memory/1188-48-0x00000000051B0000-0x0000000005269000-memory.dmp

    Filesize

    740KB

  • memory/1188-50-0x00000000051B0000-0x0000000005269000-memory.dmp

    Filesize

    740KB

  • memory/2568-32-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2568-33-0x0000000000BB0000-0x0000000000EB3000-memory.dmp

    Filesize

    3.0MB

  • memory/2568-36-0x0000000000180000-0x0000000000195000-memory.dmp

    Filesize

    84KB

  • memory/2568-35-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2820-39-0x0000000000890000-0x000000000089B000-memory.dmp

    Filesize

    44KB

  • memory/2820-38-0x0000000000890000-0x000000000089B000-memory.dmp

    Filesize

    44KB

  • memory/2820-40-0x00000000000D0000-0x00000000000FF000-memory.dmp

    Filesize

    188KB

  • memory/3004-11-0x00000000001F0000-0x00000000001F4000-memory.dmp

    Filesize

    16KB