Analysis

  • max time kernel
    148s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 15:19

General

  • Target

    quote.exe

  • Size

    1015KB

  • MD5

    d239aa442968f1ecd78ec3fead79f1c5

  • SHA1

    28d69f73c75a419ced1bed487f14ea09dab85b7a

  • SHA256

    9701e87ea4beda798663d1e09569103cc9dcf517e2e9ad41d0f9304247cf2f1c

  • SHA512

    c030f718b976b856d2aad62f9de5d7298139bd2dc718c796693007ec59af7d985ec1225a278715a224a2fde20421867f6d318acba4968854083e8085828b1395

  • SSDEEP

    24576:BWzf2ryot2cyzmPLtEux5fXDj7RplYRIVcfc2:BWCMfG1xj1plYq9

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

gbs

Decoy

luxuryinstalls.com

thatszesty.com

distributed.team

cilaf.com

aspenonmain.com

clivehamiltonstone.com

alternadoresdelta.com

tortises.com

rivenguard.mobi

ileverageagency.com

etcglobaltrading.com

thetotalbusinesssolution.com

referralfromeap.com

influencermonk.com

shopartthekid.com

thestorycollectorinc.com

kichunclub.com

virginiaparent.com

comptoirsolis.com

wwwthenewyorktimes.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3380
    • C:\Users\Admin\AppData\Local\Temp\quote.exe
      "C:\Users\Admin\AppData\Local\Temp\quote.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZaIDWzKCuyKIFR" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFC5C.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:1680
      • C:\Users\Admin\AppData\Local\Temp\quote.exe
        "C:\Users\Admin\AppData\Local\Temp\quote.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4164
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5036
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\quote.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpFC5C.tmp

    Filesize

    1KB

    MD5

    5e6002246f6ce331e2f87370b8d45b32

    SHA1

    cf764407f0219619e3bac09e143c9f7123d27399

    SHA256

    2ef3df755eebafb4bff14134c8462cfff53baa17cf678a60f498d88d6b853b01

    SHA512

    047daf5f4e29539b1f4121a4918b954c4d35164cfed100f9c31596058323156bf8152bdc3b48bb5ecc552de71a1b1542550cc36f380d8800293c027fe5b92a91

  • memory/2316-6-0x0000000005940000-0x000000000594A000-memory.dmp

    Filesize

    40KB

  • memory/2316-19-0x0000000074860000-0x0000000075010000-memory.dmp

    Filesize

    7.7MB

  • memory/2316-3-0x0000000005ED0000-0x0000000006474000-memory.dmp

    Filesize

    5.6MB

  • memory/2316-5-0x00000000059C0000-0x0000000005A52000-memory.dmp

    Filesize

    584KB

  • memory/2316-4-0x0000000074860000-0x0000000075010000-memory.dmp

    Filesize

    7.7MB

  • memory/2316-0-0x000000007486E000-0x000000007486F000-memory.dmp

    Filesize

    4KB

  • memory/2316-7-0x0000000005B70000-0x0000000005BC6000-memory.dmp

    Filesize

    344KB

  • memory/2316-8-0x0000000005C70000-0x0000000005C7A000-memory.dmp

    Filesize

    40KB

  • memory/2316-9-0x000000007486E000-0x000000007486F000-memory.dmp

    Filesize

    4KB

  • memory/2316-10-0x0000000074860000-0x0000000075010000-memory.dmp

    Filesize

    7.7MB

  • memory/2316-11-0x00000000014B0000-0x0000000001512000-memory.dmp

    Filesize

    392KB

  • memory/2316-2-0x0000000005880000-0x000000000591C000-memory.dmp

    Filesize

    624KB

  • memory/2316-1-0x0000000000A60000-0x0000000000B64000-memory.dmp

    Filesize

    1.0MB

  • memory/3380-31-0x00000000083F0000-0x00000000084FF000-memory.dmp

    Filesize

    1.1MB

  • memory/3380-24-0x0000000002C90000-0x0000000002D75000-memory.dmp

    Filesize

    916KB

  • memory/3380-27-0x0000000002C90000-0x0000000002D75000-memory.dmp

    Filesize

    916KB

  • memory/3380-32-0x00000000083F0000-0x00000000084FF000-memory.dmp

    Filesize

    1.1MB

  • memory/3380-34-0x00000000083F0000-0x00000000084FF000-memory.dmp

    Filesize

    1.1MB

  • memory/4164-17-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4164-22-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4164-23-0x00000000016E0000-0x00000000016F4000-memory.dmp

    Filesize

    80KB

  • memory/4164-20-0x0000000001700000-0x0000000001A4A000-memory.dmp

    Filesize

    3.3MB

  • memory/5036-25-0x0000000000330000-0x0000000000387000-memory.dmp

    Filesize

    348KB

  • memory/5036-26-0x0000000000330000-0x0000000000387000-memory.dmp

    Filesize

    348KB