Analysis

  • max time kernel
    147s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2024 02:18

General

  • Target

    b481fd78d0f715aaf7d7446c33e2bdf500e52e1c0d58ce5f81efae25ff9a8fd2.exe

  • Size

    758KB

  • MD5

    d6b81c33449a58e41301d210bc265632

  • SHA1

    46b121a17c3f960430f488bcb4cc1c15307bdd55

  • SHA256

    b481fd78d0f715aaf7d7446c33e2bdf500e52e1c0d58ce5f81efae25ff9a8fd2

  • SHA512

    86bdadb1b65e6f7de574d7851518f52bdfd05c5e84a881115a9a7204693847b95094a6a4cc23a926fdb66433926c7ace6b54cc83e88272a66074712876882a4a

  • SSDEEP

    12288:v6Wq4aaE6KwyF5L0Y2D1PqLTA1S3c0DLFvFjmOd1soYKrdyTnapuTHTNOG002Iil:tthEVaPqLTAV89FNXuKrd6hTzoD02Iil

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

c24t

Decoy

ealthbridgeccs.online

ngelicais.art

uktuksu1.sbs

fapoker.asia

hecreature.tech

orenzoplaybest14.xyz

op-smartphones-deal.today

delark.click

7395.asia

otnews.cfd

j16e.xyz

oko.events

fscxb.top

roudtxliberals.vote

asas-br.bond

ourhealthyourlife.shop

fbpd.top

j9u9.xyz

uijiuw.top

aming-chair-37588.bond

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 61 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3472
    • C:\Users\Admin\AppData\Local\Temp\b481fd78d0f715aaf7d7446c33e2bdf500e52e1c0d58ce5f81efae25ff9a8fd2.exe
      "C:\Users\Admin\AppData\Local\Temp\b481fd78d0f715aaf7d7446c33e2bdf500e52e1c0d58ce5f81efae25ff9a8fd2.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\b481fd78d0f715aaf7d7446c33e2bdf500e52e1c0d58ce5f81efae25ff9a8fd2.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2416
        • C:\Windows\SysWOW64\autoconv.exe
          "C:\Windows\SysWOW64\autoconv.exe"
          4⤵
            PID:4436
          • C:\Windows\SysWOW64\autoconv.exe
            "C:\Windows\SysWOW64\autoconv.exe"
            4⤵
              PID:3416
            • C:\Windows\SysWOW64\autoconv.exe
              "C:\Windows\SysWOW64\autoconv.exe"
              4⤵
                PID:3764
              • C:\Windows\SysWOW64\cscript.exe
                "C:\Windows\SysWOW64\cscript.exe"
                4⤵
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2028
                • C:\Windows\SysWOW64\cmd.exe
                  /c del "C:\Windows\SysWOW64\svchost.exe"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:4844
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 760
              3⤵
              • Program crash
              PID:4548
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2564 -ip 2564
          1⤵
            PID:1256
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4304,i,12198811467968044966,17227406646827438786,262144 --variations-seed-version --mojo-platform-channel-handle=4060 /prefetch:8
            1⤵
              PID:2816

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2028-17-0x00000000004B0000-0x00000000004D7000-memory.dmp

              Filesize

              156KB

            • memory/2028-18-0x0000000000450000-0x000000000047F000-memory.dmp

              Filesize

              188KB

            • memory/2028-16-0x00000000004B0000-0x00000000004D7000-memory.dmp

              Filesize

              156KB

            • memory/2416-8-0x0000000000700000-0x000000000072F000-memory.dmp

              Filesize

              188KB

            • memory/2416-13-0x0000000000700000-0x000000000072F000-memory.dmp

              Filesize

              188KB

            • memory/2416-9-0x00000000015B0000-0x00000000015C4000-memory.dmp

              Filesize

              80KB

            • memory/2416-4-0x0000000000700000-0x000000000072F000-memory.dmp

              Filesize

              188KB

            • memory/2416-7-0x0000000001100000-0x000000000144A000-memory.dmp

              Filesize

              3.3MB

            • memory/2416-14-0x0000000002EC0000-0x0000000002ED4000-memory.dmp

              Filesize

              80KB

            • memory/2564-3-0x00000000040E0000-0x00000000042E0000-memory.dmp

              Filesize

              2.0MB

            • memory/2564-11-0x0000000000400000-0x00000000004C2000-memory.dmp

              Filesize

              776KB

            • memory/2564-0-0x0000000000400000-0x00000000004C2000-memory.dmp

              Filesize

              776KB

            • memory/3472-15-0x00000000081D0000-0x00000000082B1000-memory.dmp

              Filesize

              900KB

            • memory/3472-10-0x00000000086C0000-0x00000000087D1000-memory.dmp

              Filesize

              1.1MB

            • memory/3472-19-0x00000000081D0000-0x00000000082B1000-memory.dmp

              Filesize

              900KB

            • memory/3472-22-0x00000000087E0000-0x00000000088E0000-memory.dmp

              Filesize

              1024KB

            • memory/3472-23-0x00000000087E0000-0x00000000088E0000-memory.dmp

              Filesize

              1024KB

            • memory/3472-25-0x00000000087E0000-0x00000000088E0000-memory.dmp

              Filesize

              1024KB