Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-09-2024 20:18

General

  • Target

    invoice.exe

  • Size

    384KB

  • MD5

    e6fcc19f1ef03db2c4d40dcb949ce40f

  • SHA1

    0823317ace170ee272b02368c9a3daa5a292765b

  • SHA256

    3f5c9bf874c9e7dbbd79fcafa447c3ae0f35659827f91555ba09a2fa13a862dd

  • SHA512

    4bdaab26e5deb5da4fa93dc583da96292f05e40dd0da2b26eb1e33d7b5ce68f3db751586839826d43d9c0202ca2dfb8cccb51eda70c72bde7cf9e80779edc460

  • SSDEEP

    6144:yQ78PdlxClB67NxX6JyBVIbMNISinsysqZbMyLYDtVJyg:yFSejXbVhISgdsqZbHLY3

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

rs26

Decoy

amazon-review.info

17kaihuiba.com

timeableholdings.com

techvestorsmultifamily.com

rokketsoftware.com

abbigliamentoagricolo.com

artjiayi.com

smooouse.com

lightcastwired.com

bravuad.com

mr133.com

clubfitdartmouth.com

masturbation-stories.net

yedekparcatreni.com

pureologyrising.com

goodsystem2updating.download

fn4pk8p0o5.com

climatechangersofny.com

shuangxian023.com

lxiuot.men

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\invoice.exe
      "C:\Users\Admin\AppData\Local\Temp\invoice.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JQGuJQhYCPqeAJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5C91.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2696
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        "{path}"
        3⤵
          PID:2832
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
          "{path}"
          3⤵
            PID:2704
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
            "{path}"
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:2572
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\SysWOW64\netsh.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2772
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3008

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmp5C91.tmp

        Filesize

        1KB

        MD5

        487e617b2ead883677307e8dd18bbf46

        SHA1

        99b3c8b81661ab21efd68a0bd260edd2fab0d673

        SHA256

        d95c10f68945dd62c0cf784d270cccb6b5e0c36222cb84e0a659296014521966

        SHA512

        d1c3dc46761bfa6bece06a681fab8951c9f0792b5dfc7f2b2517577dac05036e2f9a95dbed12cd104841c49ba86c41e33f0b1187871df9ae4db199941873ac03

      • memory/1204-26-0x0000000004FB0000-0x0000000005134000-memory.dmp

        Filesize

        1.5MB

      • memory/1204-22-0x0000000004FB0000-0x0000000005134000-memory.dmp

        Filesize

        1.5MB

      • memory/2572-21-0x00000000002A0000-0x00000000002B4000-memory.dmp

        Filesize

        80KB

      • memory/2572-20-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/2572-18-0x0000000000940000-0x0000000000C43000-memory.dmp

        Filesize

        3.0MB

      • memory/2572-16-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/2572-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2572-12-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/2572-11-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/2772-25-0x00000000015A0000-0x00000000015BB000-memory.dmp

        Filesize

        108KB

      • memory/2772-23-0x00000000015A0000-0x00000000015BB000-memory.dmp

        Filesize

        108KB

      • memory/3052-17-0x0000000074220000-0x00000000747CB000-memory.dmp

        Filesize

        5.7MB

      • memory/3052-3-0x0000000074220000-0x00000000747CB000-memory.dmp

        Filesize

        5.7MB

      • memory/3052-0-0x0000000074221000-0x0000000074222000-memory.dmp

        Filesize

        4KB

      • memory/3052-4-0x0000000074220000-0x00000000747CB000-memory.dmp

        Filesize

        5.7MB

      • memory/3052-2-0x0000000074220000-0x00000000747CB000-memory.dmp

        Filesize

        5.7MB

      • memory/3052-1-0x0000000074220000-0x00000000747CB000-memory.dmp

        Filesize

        5.7MB