Analysis

  • max time kernel
    146s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 14:05

General

  • Target

    ORDEN_04.09.2024 DON LAFFAN.pdf.exe

  • Size

    1.2MB

  • MD5

    4fe114deb063606d6786cc3d0390174f

  • SHA1

    7dd471d40977da29e0d1b00394ef82cbe33766d2

  • SHA256

    0d7511007c8c1e3b7dacf41792a9307b71504c33bdcfa78367384475e2fa7cb3

  • SHA512

    68e1267e48bb55bfcaeabca144c2fc43d21173359157b31359db49ddf3144d97f1ddbca442f4e5af9c984c6641d7e18014604a69b29ee6f7378184bb2d3aa95c

  • SSDEEP

    24576:LAHnh+eWsN3skA4RV1Hom2KXMmHajnpfF2WIB6Eluhh5:mh+ZkldoPK8YajnlcB6V

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

rn94

Decoy

st68v.xyz

conciergenotary.net

qwechaotk.top

rtpdonatoto29.xyz

8ad.xyz

powermove.top

cameras-30514.bond

vanguardcoffee.shop

umoe53fxc1bsujv.buzz

consultoriamax.net

hplxx.com

ndu.wtf

yzh478c.xyz

bigbrown999.site

xiake07.asia

resdai.xyz

the35678.shop

ba6rf.rest

ceo688.com

phimxhot.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3420
    • C:\Users\Admin\AppData\Local\Temp\ORDEN_04.09.2024 DON LAFFAN.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\ORDEN_04.09.2024 DON LAFFAN.pdf.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Users\Admin\AppData\Local\directory\name.exe
        "C:\Users\Admin\AppData\Local\Temp\ORDEN_04.09.2024 DON LAFFAN.pdf.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3576
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\ORDEN_04.09.2024 DON LAFFAN.pdf.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1772
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3668
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\svchost.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Dunlop

    Filesize

    203KB

    MD5

    390c711bcd07298a6bf36805e3902d49

    SHA1

    f6b118de4b3d201610502bbfbd6740d6a9c55e52

    SHA256

    71aa4e38c636da626fc879b842824e2ec4387c9a619174e876dc8b26389e4f3a

    SHA512

    777c73944fa10483dbb1fbe286b05f398f5a61f882f4c9ff36a57f5019e9768a6fc0016c1ec5682791e06e778451aa947b4038da2d22c893b8bc30d6d00f4743

  • C:\Users\Admin\AppData\Local\Temp\intemeration

    Filesize

    128KB

    MD5

    d07a1104c9ba1d08c651a173dc31e298

    SHA1

    ead3ad6b084fd6f00919fcf00898d7819ddd560e

    SHA256

    58d30e3134d8091403b920b1f36f5224d79fca8e760052608e9c14ee0f2a363e

    SHA512

    4c459da720d6140076be69edff56ebfe51f7df0fac6a5bebdf753ec171b363a928a80dd779f700b072c08bcd0743c09408f5431d1b5c95ebbe55a5da9096fefe

  • C:\Users\Admin\AppData\Local\directory\name.exe

    Filesize

    1.2MB

    MD5

    4fe114deb063606d6786cc3d0390174f

    SHA1

    7dd471d40977da29e0d1b00394ef82cbe33766d2

    SHA256

    0d7511007c8c1e3b7dacf41792a9307b71504c33bdcfa78367384475e2fa7cb3

    SHA512

    68e1267e48bb55bfcaeabca144c2fc43d21173359157b31359db49ddf3144d97f1ddbca442f4e5af9c984c6641d7e18014604a69b29ee6f7378184bb2d3aa95c

  • memory/1772-33-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1772-30-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1772-31-0x0000000001700000-0x0000000001A4A000-memory.dmp

    Filesize

    3.3MB

  • memory/1772-34-0x0000000001670000-0x0000000001685000-memory.dmp

    Filesize

    84KB

  • memory/2484-11-0x00000000041A0000-0x00000000041A4000-memory.dmp

    Filesize

    16KB

  • memory/3420-35-0x0000000008880000-0x00000000089B0000-memory.dmp

    Filesize

    1.2MB

  • memory/3420-39-0x0000000008880000-0x00000000089B0000-memory.dmp

    Filesize

    1.2MB

  • memory/3420-43-0x0000000008A50000-0x0000000008B9D000-memory.dmp

    Filesize

    1.3MB

  • memory/3668-36-0x00000000004A0000-0x00000000004F7000-memory.dmp

    Filesize

    348KB

  • memory/3668-37-0x00000000004A0000-0x00000000004F7000-memory.dmp

    Filesize

    348KB

  • memory/3668-38-0x0000000001210000-0x000000000123F000-memory.dmp

    Filesize

    188KB