Analysis

  • max time kernel
    146s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2024 18:10

General

  • Target

    Shipment Notification.exe

  • Size

    339KB

  • MD5

    4051f49c770d335749e6bc72f5aa9c98

  • SHA1

    8a88643c75588960adf3efb1d37ebfd126f25b3c

  • SHA256

    57970209107e8f230a66a3573e21b65ca46a5445554544948af6cdd27f144bf0

  • SHA512

    0b43412e7f471e6dbdb8e94a69ad03cf688b68be5f00aca87d9233833a0c808687235a2b2ccfae5a4db8c32fb7b938b9bc90cfc27829631d56ff3ea3a724b5d0

  • SSDEEP

    6144:AEbkSsHZgpaxPXzWUXGRSK+pzfb6g/XRis76zXn9x1MVgjYf:AW2aSjN2+pKgP49xrY

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

nm5

Decoy

realestatecaffe.com

fetels.com

starvenus.world

dejashannon.com

zali.ltd

shangyuanfushi.com

socialmediagent.com

alphaomega.team

p3lp4.net

narandina.com

equfiaxsecurity2017.com

tribeofchristians.com

yutangke.com

lequf.com

ecabuyukcekmece.net

onlinexclip.com

harmonitza.com

velvetpelvis.com

manlexue.net

curtainspy.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3432
    • C:\Users\Admin\AppData\Local\Temp\Shipment Notification.exe
      "C:\Users\Admin\AppData\Local\Temp\Shipment Notification.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:3700
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Shipment Notification.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2712-7-0x0000000000A80000-0x0000000000AD7000-memory.dmp

    Filesize

    348KB

  • memory/2712-8-0x0000000000A80000-0x0000000000AD7000-memory.dmp

    Filesize

    348KB

  • memory/3432-6-0x0000000008020000-0x00000000080DD000-memory.dmp

    Filesize

    756KB

  • memory/3432-9-0x0000000008020000-0x00000000080DD000-memory.dmp

    Filesize

    756KB

  • memory/3432-14-0x0000000008490000-0x00000000085A1000-memory.dmp

    Filesize

    1.1MB

  • memory/3432-16-0x0000000008490000-0x00000000085A1000-memory.dmp

    Filesize

    1.1MB

  • memory/3432-17-0x0000000008490000-0x00000000085A1000-memory.dmp

    Filesize

    1.1MB

  • memory/3700-1-0x0000000002300000-0x0000000002400000-memory.dmp

    Filesize

    1024KB

  • memory/3700-2-0x0000000002890000-0x0000000002BDA000-memory.dmp

    Filesize

    3.3MB

  • memory/3700-5-0x0000000000820000-0x0000000000834000-memory.dmp

    Filesize

    80KB

  • memory/3700-4-0x0000000002300000-0x0000000002400000-memory.dmp

    Filesize

    1024KB