Analysis

  • max time kernel
    145s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 15:19

General

  • Target

    quote.exe

  • Size

    1015KB

  • MD5

    d239aa442968f1ecd78ec3fead79f1c5

  • SHA1

    28d69f73c75a419ced1bed487f14ea09dab85b7a

  • SHA256

    9701e87ea4beda798663d1e09569103cc9dcf517e2e9ad41d0f9304247cf2f1c

  • SHA512

    c030f718b976b856d2aad62f9de5d7298139bd2dc718c796693007ec59af7d985ec1225a278715a224a2fde20421867f6d318acba4968854083e8085828b1395

  • SSDEEP

    24576:BWzf2ryot2cyzmPLtEux5fXDj7RplYRIVcfc2:BWCMfG1xj1plYq9

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

gbs

Decoy

luxuryinstalls.com

thatszesty.com

distributed.team

cilaf.com

aspenonmain.com

clivehamiltonstone.com

alternadoresdelta.com

tortises.com

rivenguard.mobi

ileverageagency.com

etcglobaltrading.com

thetotalbusinesssolution.com

referralfromeap.com

influencermonk.com

shopartthekid.com

thestorycollectorinc.com

kichunclub.com

virginiaparent.com

comptoirsolis.com

wwwthenewyorktimes.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\quote.exe
      "C:\Users\Admin\AppData\Local\Temp\quote.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZaIDWzKCuyKIFR" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE6C6.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2908
      • C:\Users\Admin\AppData\Local\Temp\quote.exe
        "C:\Users\Admin\AppData\Local\Temp\quote.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2856
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\quote.exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpE6C6.tmp

    Filesize

    1KB

    MD5

    cdf7dcbd3a3b15899905096fd8ece4f5

    SHA1

    287088b4a6d86b6536b4d473e8177474dbeedfd8

    SHA256

    b6e8e4ad47fec4fc297a4ea33e9e526d4d32931c079e10865f23e818e512ed41

    SHA512

    688ff70af60a617dfa27d341b1a1d62e8d0536fea629e2ebaf29a2a4619c4a4fde5d07aac2d4a6f5b1b569050b932b2c790891768b885d0c065a36e9ad3ddb02

  • memory/1236-26-0x0000000005080000-0x0000000005170000-memory.dmp

    Filesize

    960KB

  • memory/1236-30-0x0000000007070000-0x00000000071CD000-memory.dmp

    Filesize

    1.4MB

  • memory/1236-22-0x0000000005080000-0x0000000005170000-memory.dmp

    Filesize

    960KB

  • memory/1236-27-0x0000000007070000-0x00000000071CD000-memory.dmp

    Filesize

    1.4MB

  • memory/2856-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2856-25-0x0000000000310000-0x0000000000324000-memory.dmp

    Filesize

    80KB

  • memory/2856-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2856-16-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2856-13-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2856-24-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2856-18-0x0000000000910000-0x0000000000C13000-memory.dmp

    Filesize

    3.0MB

  • memory/2856-21-0x00000000002D0000-0x00000000002E4000-memory.dmp

    Filesize

    80KB

  • memory/2856-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2884-29-0x0000000000200000-0x0000000000208000-memory.dmp

    Filesize

    32KB

  • memory/2884-28-0x0000000000200000-0x0000000000208000-memory.dmp

    Filesize

    32KB

  • memory/3008-6-0x0000000004A50000-0x0000000004AB2000-memory.dmp

    Filesize

    392KB

  • memory/3008-17-0x0000000074400000-0x0000000074AEE000-memory.dmp

    Filesize

    6.9MB

  • memory/3008-0-0x000000007440E000-0x000000007440F000-memory.dmp

    Filesize

    4KB

  • memory/3008-5-0x0000000074400000-0x0000000074AEE000-memory.dmp

    Filesize

    6.9MB

  • memory/3008-4-0x000000007440E000-0x000000007440F000-memory.dmp

    Filesize

    4KB

  • memory/3008-3-0x00000000003E0000-0x00000000003EA000-memory.dmp

    Filesize

    40KB

  • memory/3008-2-0x0000000074400000-0x0000000074AEE000-memory.dmp

    Filesize

    6.9MB

  • memory/3008-1-0x0000000001270000-0x0000000001374000-memory.dmp

    Filesize

    1.0MB