Analysis

  • max time kernel
    147s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 16:11

General

  • Target

    odsxbin20309.exe

  • Size

    651KB

  • MD5

    5670fc04099860bc61fbca6c054d7ffd

  • SHA1

    b35b270f85846d39c3eaafcf445ea0e7f25112a0

  • SHA256

    7eeedd91e430f1e9c8545e40ca7eb073e4d76104f907734f92aa4110e3ef2b9f

  • SHA512

    d07055e70a7f126c718b16aac950cbf0a09289acb5288492250b50d95a4dc91759ff8f63ab03174d20210651e85ea4d3675ff2599838a3c264cf06d779729023

  • SSDEEP

    12288:l5ttYcfMRcldhg2h9t5VG3fW/aAAgLx1oiCHX+KS5LS/pL:PLYcTldhgjWiAAwBCutExL

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

btrd

Decoy

everslane.com

prairieviewelectric.online

dszvhgd.com

papamuch.com

8129k.vip

jeffreestar.gold

bestguestrentals.com

nvzhuang1.net

anangtoto.com

yxfgor.top

practicalpoppers.com

thebestanglephotography.online

koormm.top

criika.net

audioflow.online

380747.net

jiuguanwang.net

bloxequities.com

v321c.com

sugar.monster

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Users\Admin\AppData\Local\Temp\odsxbin20309.exe
      "C:\Users\Admin\AppData\Local\Temp\odsxbin20309.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4992
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\odsxbin20309.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4420
      • C:\Users\Admin\AppData\Local\Temp\odsxbin20309.exe
        "C:\Users\Admin\AppData\Local\Temp\odsxbin20309.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4856
    • C:\Windows\SysWOW64\cscript.exe
      "C:\Windows\SysWOW64\cscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3212
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\odsxbin20309.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1664

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_r5daoc3w.gjd.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/3212-74-0x0000000000940000-0x000000000096F000-memory.dmp

          Filesize

          188KB

        • memory/3212-73-0x0000000000470000-0x0000000000497000-memory.dmp

          Filesize

          156KB

        • memory/3212-72-0x0000000000470000-0x0000000000497000-memory.dmp

          Filesize

          156KB

        • memory/3428-21-0x0000000002E90000-0x0000000002FF1000-memory.dmp

          Filesize

          1.4MB

        • memory/3428-79-0x00000000086A0000-0x0000000008795000-memory.dmp

          Filesize

          980KB

        • memory/3428-75-0x00000000046D0000-0x00000000047FE000-memory.dmp

          Filesize

          1.2MB

        • memory/3428-71-0x00000000046D0000-0x00000000047FE000-memory.dmp

          Filesize

          1.2MB

        • memory/3428-68-0x0000000002E90000-0x0000000002FF1000-memory.dmp

          Filesize

          1.4MB

        • memory/4420-58-0x0000000007D30000-0x0000000007DC6000-memory.dmp

          Filesize

          600KB

        • memory/4420-52-0x0000000005370000-0x0000000005380000-memory.dmp

          Filesize

          64KB

        • memory/4420-66-0x00000000748F0000-0x00000000750A0000-memory.dmp

          Filesize

          7.7MB

        • memory/4420-63-0x0000000007DD0000-0x0000000007DD8000-memory.dmp

          Filesize

          32KB

        • memory/4420-16-0x00000000748FE000-0x00000000748FF000-memory.dmp

          Filesize

          4KB

        • memory/4420-62-0x0000000007DF0000-0x0000000007E0A000-memory.dmp

          Filesize

          104KB

        • memory/4420-14-0x0000000002E60000-0x0000000002E96000-memory.dmp

          Filesize

          216KB

        • memory/4420-17-0x00000000059B0000-0x0000000005FD8000-memory.dmp

          Filesize

          6.2MB

        • memory/4420-61-0x0000000007CF0000-0x0000000007D04000-memory.dmp

          Filesize

          80KB

        • memory/4420-22-0x0000000005370000-0x0000000005380000-memory.dmp

          Filesize

          64KB

        • memory/4420-60-0x0000000007CE0000-0x0000000007CEE000-memory.dmp

          Filesize

          56KB

        • memory/4420-59-0x0000000007CB0000-0x0000000007CC1000-memory.dmp

          Filesize

          68KB

        • memory/4420-19-0x00000000748F0000-0x00000000750A0000-memory.dmp

          Filesize

          7.7MB

        • memory/4420-24-0x00000000058B0000-0x00000000058D2000-memory.dmp

          Filesize

          136KB

        • memory/4420-25-0x0000000006050000-0x00000000060B6000-memory.dmp

          Filesize

          408KB

        • memory/4420-26-0x00000000060C0000-0x0000000006126000-memory.dmp

          Filesize

          408KB

        • memory/4420-57-0x0000000007B20000-0x0000000007B2A000-memory.dmp

          Filesize

          40KB

        • memory/4420-36-0x0000000006160000-0x00000000064B4000-memory.dmp

          Filesize

          3.3MB

        • memory/4420-37-0x0000000006790000-0x00000000067AE000-memory.dmp

          Filesize

          120KB

        • memory/4420-38-0x00000000069E0000-0x0000000006A2C000-memory.dmp

          Filesize

          304KB

        • memory/4420-39-0x000000007EFC0000-0x000000007EFD0000-memory.dmp

          Filesize

          64KB

        • memory/4420-40-0x0000000007740000-0x0000000007772000-memory.dmp

          Filesize

          200KB

        • memory/4420-41-0x0000000070790000-0x00000000707DC000-memory.dmp

          Filesize

          304KB

        • memory/4420-56-0x0000000007AB0000-0x0000000007ACA000-memory.dmp

          Filesize

          104KB

        • memory/4420-50-0x0000000005370000-0x0000000005380000-memory.dmp

          Filesize

          64KB

        • memory/4420-53-0x0000000006D60000-0x0000000006D7E000-memory.dmp

          Filesize

          120KB

        • memory/4420-54-0x0000000007980000-0x0000000007A23000-memory.dmp

          Filesize

          652KB

        • memory/4420-55-0x00000000080F0000-0x000000000876A000-memory.dmp

          Filesize

          6.5MB

        • memory/4856-15-0x00000000010D0000-0x000000000141A000-memory.dmp

          Filesize

          3.3MB

        • memory/4856-69-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4856-70-0x0000000001070000-0x0000000001084000-memory.dmp

          Filesize

          80KB

        • memory/4856-20-0x0000000001010000-0x0000000001024000-memory.dmp

          Filesize

          80KB

        • memory/4856-11-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4856-23-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4992-9-0x0000000004750000-0x00000000047C6000-memory.dmp

          Filesize

          472KB

        • memory/4992-13-0x00000000748D0000-0x0000000075080000-memory.dmp

          Filesize

          7.7MB

        • memory/4992-10-0x000000000BFC0000-0x000000000C05C000-memory.dmp

          Filesize

          624KB

        • memory/4992-7-0x00000000748DE000-0x00000000748DF000-memory.dmp

          Filesize

          4KB

        • memory/4992-0-0x00000000748DE000-0x00000000748DF000-memory.dmp

          Filesize

          4KB

        • memory/4992-8-0x00000000748D0000-0x0000000075080000-memory.dmp

          Filesize

          7.7MB

        • memory/4992-6-0x00000000066D0000-0x00000000066EE000-memory.dmp

          Filesize

          120KB

        • memory/4992-5-0x0000000004D40000-0x0000000004D4A000-memory.dmp

          Filesize

          40KB

        • memory/4992-4-0x00000000748D0000-0x0000000075080000-memory.dmp

          Filesize

          7.7MB

        • memory/4992-3-0x0000000004D70000-0x0000000004E02000-memory.dmp

          Filesize

          584KB

        • memory/4992-2-0x0000000005280000-0x0000000005824000-memory.dmp

          Filesize

          5.6MB

        • memory/4992-1-0x0000000000290000-0x000000000033A000-memory.dmp

          Filesize

          680KB