Analysis

  • max time kernel
    149s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2024 09:38

General

  • Target

    PURCHASEDORDEROFENG091.exe

  • Size

    24KB

  • MD5

    30ecd7046839af0716977a9ef6047e60

  • SHA1

    a1f6517726c9dc0f3d588b947e2aaeb4f849f58c

  • SHA256

    472a703381c8fe89f83b0fe4d7960b0942c5694054ba94dd85c249c4c702e0cd

  • SHA512

    7dad8ec1c5040112deee48ef6dbd56e7aac3db65dee11568f5e9fea96b33b2b6030f560c834ba51dcb0cb98eb837c2638e7f9c8b39c1f46395bd8259c88f8937

  • SSDEEP

    384:zZizC2pKXg9eH58VkRS/oFGPikzhlZBBmBi1S0f9EKR4VWjs5anwNmJ8sxSvpphB:z/wJevBzM6RB

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

btrd

Decoy

everslane.com

prairieviewelectric.online

dszvhgd.com

papamuch.com

8129k.vip

jeffreestar.gold

bestguestrentals.com

nvzhuang1.net

anangtoto.com

yxfgor.top

practicalpoppers.com

thebestanglephotography.online

koormm.top

criika.net

audioflow.online

380747.net

jiuguanwang.net

bloxequities.com

v321c.com

sugar.monster

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\PURCHASEDORDEROFENG091.exe
      "C:\Users\Admin\AppData\Local\Temp\PURCHASEDORDEROFENG091.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:792
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASEDORDEROFENG091" /t REG_SZ /F /D "C:\Users\Admin\Documents\PURCHASEDORDEROFENG091.pif"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASEDORDEROFENG091" /t REG_SZ /F /D "C:\Users\Admin\Documents\PURCHASEDORDEROFENG091.pif"
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:2964
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c Copy "C:\Users\Admin\AppData\Local\Temp\PURCHASEDORDEROFENG091.exe" "C:\Users\Admin\Documents\PURCHASEDORDEROFENG091.pif"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2324
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2836
    • C:\Windows\SysWOW64\raserver.exe
      "C:\Windows\SysWOW64\raserver.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/792-0-0x0000000073F2E000-0x0000000073F2F000-memory.dmp

    Filesize

    4KB

  • memory/792-1-0x00000000003B0000-0x00000000003BC000-memory.dmp

    Filesize

    48KB

  • memory/792-2-0x0000000073F20000-0x000000007460E000-memory.dmp

    Filesize

    6.9MB

  • memory/792-3-0x0000000005A10000-0x0000000005AA4000-memory.dmp

    Filesize

    592KB

  • memory/792-6-0x0000000073F2E000-0x0000000073F2F000-memory.dmp

    Filesize

    4KB

  • memory/792-12-0x0000000073F20000-0x000000007460E000-memory.dmp

    Filesize

    6.9MB

  • memory/1264-24-0x0000000003F00000-0x0000000004100000-memory.dmp

    Filesize

    2.0MB

  • memory/1264-22-0x0000000004B60000-0x0000000004C5F000-memory.dmp

    Filesize

    1020KB

  • memory/1264-17-0x0000000004B60000-0x0000000004C5F000-memory.dmp

    Filesize

    1020KB

  • memory/1264-16-0x0000000000010000-0x0000000000020000-memory.dmp

    Filesize

    64KB

  • memory/2836-13-0x0000000000D90000-0x0000000001093000-memory.dmp

    Filesize

    3.0MB

  • memory/2836-15-0x0000000000170000-0x0000000000184000-memory.dmp

    Filesize

    80KB

  • memory/2836-8-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2836-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2836-19-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2836-11-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2836-7-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2844-18-0x00000000007C0000-0x00000000007DC000-memory.dmp

    Filesize

    112KB

  • memory/2844-20-0x00000000007C0000-0x00000000007DC000-memory.dmp

    Filesize

    112KB

  • memory/2844-21-0x00000000000D0000-0x00000000000FF000-memory.dmp

    Filesize

    188KB