Analysis

  • max time kernel
    148s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 19:46

General

  • Target

    2.exe

  • Size

    185KB

  • MD5

    cb90c75f8cbbbcc3f74ee22288c800a1

  • SHA1

    1c84ad88465e6eb1b91dfaf099bf2697e44ccc0d

  • SHA256

    b3d45d85cba27f6900215868e9e6e9a97fb95648a42396305cd8bcb50c8e80d0

  • SHA512

    22e8fd5f34e92ffb92e362efdc3866c9bfab68a5f6f463f64ae4f16876722dd4595e0cff34f970dd87140859b58e6acdb20c8b82f27ed42bbf7cc80f46e7a314

  • SSDEEP

    3072:8MHDFaMPRIjxWcy4C9y30XclW6Qilinp0fJ4XNZkAC581h/dgHG0uD1X4/qZa:e7UL4Co3js6QilinA4XN+zKh/uG0u5XC

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

l26n

Decoy

vtxapg.bond

iscussatthetable.net

q5b2.vip

urculturalbuzz.buzz

0xfulisuo.xyz

iz-kyc.online

atladies4kamala.vote

aison-maison.xyz

codom73.online

aosecurity.online

szxart.xyz

ergecast.net

ealker.pro

hickensforkfc.net

ldoradocasino-uee.top

afiqgroup.net

ercania.net

sdc.ngo

raphic-design-degree-37012.bond

888yl123.vip

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Users\Admin\AppData\Local\Temp\2.exe
      "C:\Users\Admin\AppData\Local\Temp\2.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:3060
    • C:\Windows\SysWOW64\colorcpl.exe
      "C:\Windows\SysWOW64\colorcpl.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\2.exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1372-3-0x0000000007380000-0x000000000752C000-memory.dmp

    Filesize

    1.7MB

  • memory/1372-7-0x0000000007380000-0x000000000752C000-memory.dmp

    Filesize

    1.7MB

  • memory/1372-9-0x0000000006490000-0x0000000006579000-memory.dmp

    Filesize

    932KB

  • memory/1372-10-0x0000000006490000-0x0000000006579000-memory.dmp

    Filesize

    932KB

  • memory/1372-12-0x0000000006490000-0x0000000006579000-memory.dmp

    Filesize

    932KB

  • memory/1980-4-0x0000000000180000-0x0000000000198000-memory.dmp

    Filesize

    96KB

  • memory/1980-5-0x0000000000180000-0x0000000000198000-memory.dmp

    Filesize

    96KB

  • memory/1980-6-0x00000000000D0000-0x00000000000FF000-memory.dmp

    Filesize

    188KB

  • memory/3060-0-0x00000000009B0000-0x0000000000CB3000-memory.dmp

    Filesize

    3.0MB

  • memory/3060-2-0x00000000003D0000-0x00000000003FF000-memory.dmp

    Filesize

    188KB

  • memory/3060-1-0x00000000003EF000-0x00000000003F0000-memory.dmp

    Filesize

    4KB