Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 08:29

General

  • Target

    TaM7bqgMSWHgB70.exe

  • Size

    759KB

  • MD5

    7964a64e6b4d057c5499ee8014065ca9

  • SHA1

    2d35cd22d3c737deffa70a849b2532a611706bb4

  • SHA256

    0689efc1f50248e1c54837bb7c19113fd293eb18623147113910df57017fe260

  • SHA512

    3dc319baeee1fbc73931d56515898bfc9e84d7638185597fc0c71e503700dd664c12b1ce6dd46e8a2ab3e13ac49b7898497bd9067e198296b0f9d1752d832a2a

  • SSDEEP

    12288:kREG1UoIG5MPUgo7CXeLZfWdmI5uX+KFejLbOPrAfrNuctl:6RUobyemifWdm+uX+FLb2iua

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

he2a

Decoy

070001606.xyz

jesuseascriancas.online

as-eltransport.xyz

bankditalia-company.online

linkedin-stijngraat.online

sportsbetd.xyz

spanish-classes-76893.bond

infonation.pro

nxwzbze.forum

rush-pay.biz

fulfillmissions.lat

infolungcancer.xyz

aqario.xyz

omepro.solar

jackmanmueshl.shop

amcart.store

ishanaudichya.xyz

sun4rk.shop

depression-test-74287.bond

chipit.shop

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3488
    • C:\Users\Admin\AppData\Local\Temp\TaM7bqgMSWHgB70.exe
      "C:\Users\Admin\AppData\Local\Temp\TaM7bqgMSWHgB70.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:468
      • C:\Users\Admin\AppData\Local\Temp\TaM7bqgMSWHgB70.exe
        "C:\Users\Admin\AppData\Local\Temp\TaM7bqgMSWHgB70.exe"
        3⤵
          PID:1604
        • C:\Users\Admin\AppData\Local\Temp\TaM7bqgMSWHgB70.exe
          "C:\Users\Admin\AppData\Local\Temp\TaM7bqgMSWHgB70.exe"
          3⤵
            PID:264
          • C:\Users\Admin\AppData\Local\Temp\TaM7bqgMSWHgB70.exe
            "C:\Users\Admin\AppData\Local\Temp\TaM7bqgMSWHgB70.exe"
            3⤵
              PID:5080
            • C:\Users\Admin\AppData\Local\Temp\TaM7bqgMSWHgB70.exe
              "C:\Users\Admin\AppData\Local\Temp\TaM7bqgMSWHgB70.exe"
              3⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:4540
          • C:\Windows\SysWOW64\systray.exe
            "C:\Windows\SysWOW64\systray.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3552
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Users\Admin\AppData\Local\Temp\TaM7bqgMSWHgB70.exe"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:960

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/468-13-0x0000000074710000-0x0000000074EC0000-memory.dmp

          Filesize

          7.7MB

        • memory/468-0-0x000000007471E000-0x000000007471F000-memory.dmp

          Filesize

          4KB

        • memory/468-2-0x0000000005A60000-0x0000000006004000-memory.dmp

          Filesize

          5.6MB

        • memory/468-3-0x00000000054B0000-0x0000000005542000-memory.dmp

          Filesize

          584KB

        • memory/468-4-0x0000000005430000-0x000000000543A000-memory.dmp

          Filesize

          40KB

        • memory/468-5-0x0000000074710000-0x0000000074EC0000-memory.dmp

          Filesize

          7.7MB

        • memory/468-6-0x00000000056E0000-0x00000000056F8000-memory.dmp

          Filesize

          96KB

        • memory/468-7-0x000000007471E000-0x000000007471F000-memory.dmp

          Filesize

          4KB

        • memory/468-8-0x0000000074710000-0x0000000074EC0000-memory.dmp

          Filesize

          7.7MB

        • memory/468-9-0x00000000069B0000-0x0000000006A26000-memory.dmp

          Filesize

          472KB

        • memory/468-10-0x00000000067B0000-0x000000000684C000-memory.dmp

          Filesize

          624KB

        • memory/468-1-0x0000000000AB0000-0x0000000000B74000-memory.dmp

          Filesize

          784KB

        • memory/3488-26-0x00000000075D0000-0x00000000076B8000-memory.dmp

          Filesize

          928KB

        • memory/3488-18-0x0000000004750000-0x0000000004804000-memory.dmp

          Filesize

          720KB

        • memory/3488-22-0x0000000004750000-0x0000000004804000-memory.dmp

          Filesize

          720KB

        • memory/3488-27-0x00000000075D0000-0x00000000076B8000-memory.dmp

          Filesize

          928KB

        • memory/3488-29-0x00000000075D0000-0x00000000076B8000-memory.dmp

          Filesize

          928KB

        • memory/3552-20-0x0000000000390000-0x0000000000396000-memory.dmp

          Filesize

          24KB

        • memory/3552-19-0x0000000000390000-0x0000000000396000-memory.dmp

          Filesize

          24KB

        • memory/3552-21-0x0000000001100000-0x000000000112F000-memory.dmp

          Filesize

          188KB

        • memory/4540-14-0x0000000001670000-0x00000000019BA000-memory.dmp

          Filesize

          3.3MB

        • memory/4540-17-0x00000000011D0000-0x00000000011E4000-memory.dmp

          Filesize

          80KB

        • memory/4540-16-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4540-11-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB