Analysis

  • max time kernel
    148s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2024 10:11

General

  • Target

    Zxooek.exe

  • Size

    2.5MB

  • MD5

    232b1abbe3ed2387bd727d08716e0846

  • SHA1

    d1706a34eed5f8b482655dede78113b5adb04db2

  • SHA256

    5a11fb6ef4be30e7c7a65a256f659fab6b0833f4d32c4922f6fa36b663eb8bb3

  • SHA512

    6205cd30eed573c1dd563adc87be51c21bc14eba36e5ab1e756f715a77e33edf2e97b7884a8b7d2d5c02502495f7dc4b15562237058490d0934aa2b5c985c677

  • SSDEEP

    24576:fPNAyYA6foBNp0kdJV4Eac5h+sXDluxEkTj3v6OVOGH+kDs6+5iQc1RZLszJt74x:fP4ApBz4Eh+szkCkTj3vVnekLBGJt0V

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

e62s

Decoy

ellinksa.shop

uckyspinph.xyz

owdark.net

arriage-therapy-72241.bond

w7ijko4rv4p97b.top

heirbuzzwords.buzz

aspart.shop

ctivemail5-kagoya-com.info

shacertification9.shop

zitcd65k3.buzz

llkosoi.info

ru8.info

rhgtrdjdjykyetrdjftd.buzz

yschoollist.kiwi

oftfolio.online

rograma-de-almacen-2.online

oudoarms.top

mwquas.xyz

orjagaucha.website

nlinechat-mh.online

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Formbook payload 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Users\Admin\AppData\Local\Temp\Zxooek.exe
      "C:\Users\Admin\AppData\Local\Temp\Zxooek.exe"
      2⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4452
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:1876
    • C:\Windows\SysWOW64\cscript.exe
      "C:\Windows\SysWOW64\cscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4088
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1876-1093-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1876-1095-0x00000000018D0000-0x0000000001C1A000-memory.dmp

    Filesize

    3.3MB

  • memory/1876-1098-0x0000000001380000-0x0000000001395000-memory.dmp

    Filesize

    84KB

  • memory/1876-1097-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3428-1099-0x0000000003340000-0x000000000345D000-memory.dmp

    Filesize

    1.1MB

  • memory/3428-1110-0x0000000008C80000-0x0000000008D82000-memory.dmp

    Filesize

    1.0MB

  • memory/3428-1107-0x0000000008C80000-0x0000000008D82000-memory.dmp

    Filesize

    1.0MB

  • memory/3428-1104-0x0000000003340000-0x000000000345D000-memory.dmp

    Filesize

    1.1MB

  • memory/4088-1102-0x0000000000DB0000-0x0000000000DD7000-memory.dmp

    Filesize

    156KB

  • memory/4452-18-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-3-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-30-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-6-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-4-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-50-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-48-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-46-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-44-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-40-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-38-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-36-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-34-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-32-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-28-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-26-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-24-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-22-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-20-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-42-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-16-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-14-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-12-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-8-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-62-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-66-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-60-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-58-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-56-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-54-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-52-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-64-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-1077-0x0000000074420000-0x0000000074BD0000-memory.dmp

    Filesize

    7.7MB

  • memory/4452-1078-0x0000000074420000-0x0000000074BD0000-memory.dmp

    Filesize

    7.7MB

  • memory/4452-1079-0x0000000005460000-0x00000000054D8000-memory.dmp

    Filesize

    480KB

  • memory/4452-1080-0x00000000054E0000-0x000000000552C000-memory.dmp

    Filesize

    304KB

  • memory/4452-1081-0x0000000005650000-0x00000000056E2000-memory.dmp

    Filesize

    584KB

  • memory/4452-1082-0x00000000056F0000-0x0000000005756000-memory.dmp

    Filesize

    408KB

  • memory/4452-1086-0x0000000074420000-0x0000000074BD0000-memory.dmp

    Filesize

    7.7MB

  • memory/4452-1088-0x0000000074420000-0x0000000074BD0000-memory.dmp

    Filesize

    7.7MB

  • memory/4452-10-0x0000000005260000-0x0000000005358000-memory.dmp

    Filesize

    992KB

  • memory/4452-2-0x0000000005260000-0x000000000535E000-memory.dmp

    Filesize

    1016KB

  • memory/4452-1-0x0000000000660000-0x00000000008DA000-memory.dmp

    Filesize

    2.5MB

  • memory/4452-0-0x000000007442E000-0x000000007442F000-memory.dmp

    Filesize

    4KB

  • memory/4452-1087-0x0000000074420000-0x0000000074BD0000-memory.dmp

    Filesize

    7.7MB

  • memory/4452-1089-0x0000000006320000-0x00000000068C4000-memory.dmp

    Filesize

    5.6MB

  • memory/4452-1090-0x00000000057E0000-0x0000000005834000-memory.dmp

    Filesize

    336KB

  • memory/4452-1094-0x0000000074420000-0x0000000074BD0000-memory.dmp

    Filesize

    7.7MB