Analysis

  • max time kernel
    147s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 19:46

General

  • Target

    2.exe

  • Size

    185KB

  • MD5

    cb90c75f8cbbbcc3f74ee22288c800a1

  • SHA1

    1c84ad88465e6eb1b91dfaf099bf2697e44ccc0d

  • SHA256

    b3d45d85cba27f6900215868e9e6e9a97fb95648a42396305cd8bcb50c8e80d0

  • SHA512

    22e8fd5f34e92ffb92e362efdc3866c9bfab68a5f6f463f64ae4f16876722dd4595e0cff34f970dd87140859b58e6acdb20c8b82f27ed42bbf7cc80f46e7a314

  • SSDEEP

    3072:8MHDFaMPRIjxWcy4C9y30XclW6Qilinp0fJ4XNZkAC581h/dgHG0uD1X4/qZa:e7UL4Co3js6QilinA4XN+zKh/uG0u5XC

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

l26n

Decoy

vtxapg.bond

iscussatthetable.net

q5b2.vip

urculturalbuzz.buzz

0xfulisuo.xyz

iz-kyc.online

atladies4kamala.vote

aison-maison.xyz

codom73.online

aosecurity.online

szxart.xyz

ergecast.net

ealker.pro

hickensforkfc.net

ldoradocasino-uee.top

afiqgroup.net

ercania.net

sdc.ngo

raphic-design-degree-37012.bond

888yl123.vip

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3388
    • C:\Users\Admin\AppData\Local\Temp\2.exe
      "C:\Users\Admin\AppData\Local\Temp\2.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:3168
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\2.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1572-8-0x0000000000D30000-0x0000000000D44000-memory.dmp

    Filesize

    80KB

  • memory/1572-11-0x00000000004C0000-0x00000000004EF000-memory.dmp

    Filesize

    188KB

  • memory/1572-10-0x0000000000D30000-0x0000000000D44000-memory.dmp

    Filesize

    80KB

  • memory/3168-2-0x0000000001000000-0x000000000102F000-memory.dmp

    Filesize

    188KB

  • memory/3168-1-0x000000000101F000-0x0000000001020000-memory.dmp

    Filesize

    4KB

  • memory/3168-0-0x0000000001580000-0x00000000018CA000-memory.dmp

    Filesize

    3.3MB

  • memory/3168-5-0x0000000001000000-0x000000000102F000-memory.dmp

    Filesize

    188KB

  • memory/3168-4-0x000000000101F000-0x0000000001020000-memory.dmp

    Filesize

    4KB

  • memory/3388-3-0x00000000084E0000-0x00000000085F0000-memory.dmp

    Filesize

    1.1MB

  • memory/3388-7-0x00000000084E0000-0x00000000085F0000-memory.dmp

    Filesize

    1.1MB

  • memory/3388-6-0x00000000089E0000-0x0000000008B4B000-memory.dmp

    Filesize

    1.4MB

  • memory/3388-12-0x00000000089E0000-0x0000000008B4B000-memory.dmp

    Filesize

    1.4MB

  • memory/3388-15-0x0000000007740000-0x0000000007821000-memory.dmp

    Filesize

    900KB

  • memory/3388-17-0x0000000007740000-0x0000000007821000-memory.dmp

    Filesize

    900KB

  • memory/3388-18-0x0000000007740000-0x0000000007821000-memory.dmp

    Filesize

    900KB