Analysis

  • max time kernel
    148s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 00:33

General

  • Target

    Scan 2020227 pdf.exe

  • Size

    694KB

  • MD5

    a68a0b2d4331d61bb64172c9e9786937

  • SHA1

    a004b631c2f2aa425e3e6d9e262fb3815aef293b

  • SHA256

    461b27147a73d91bf21f4b821d7ae63b35a4efc32a87c14e718caa0644bb1dff

  • SHA512

    ad688d2d08e9ca1fab35a90d2fb049c2cddd680d10fef27dbc0da150de69bf3e068aaa9f7d4da4b7efd87623113b4cd3cdbeedd7f3a6ea1b81a82190f6b2da33

  • SSDEEP

    12288:fRmJ34UqACPQoKwICzPhVifZWFuGZkTP2bjmgqLMDburpEau8n:f0B4U+Qo5Ph4ZWkQ5egqLC4Wf2

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

cxs

Decoy

modersport.info

egoody.net

qcmutiny.com

theblueberryview.com

rupornofilm.com

katomaviation.com

therograms.net

borealisbasecamp.com

ebooksites.net

clavicon.net

burshopvarcs.win

neilmedchinhhang.com

allamericandreamcafe.info

floridasingers.com

blockchainworker.com

throneonline.com

newentrepreneurkit.com

tit.group

0s0eightother.men

las6p.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Users\Admin\AppData\Local\Temp\Scan 2020227 pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\Scan 2020227 pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Users\Admin\AppData\Local\Temp\Scan 2020227 pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\Scan 2020227 pdf.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2560
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Scan 2020227 pdf.exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1184-7-0x0000000000190000-0x0000000000290000-memory.dmp

    Filesize

    1024KB

  • memory/1184-8-0x0000000007490000-0x0000000007632000-memory.dmp

    Filesize

    1.6MB

  • memory/1184-13-0x0000000007490000-0x0000000007632000-memory.dmp

    Filesize

    1.6MB

  • memory/2560-1-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2560-6-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2560-10-0x0000000000430000-0x0000000000497000-memory.dmp

    Filesize

    412KB

  • memory/2596-9-0x0000000000960000-0x0000000000BE1000-memory.dmp

    Filesize

    2.5MB

  • memory/2596-12-0x0000000000960000-0x0000000000BE1000-memory.dmp

    Filesize

    2.5MB

  • memory/2992-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2992-4-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2992-2-0x0000000000461000-0x000000000046A000-memory.dmp

    Filesize

    36KB