Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2024 09:38

General

  • Target

    PURCHASEDORDEROFENG091.exe

  • Size

    24KB

  • MD5

    30ecd7046839af0716977a9ef6047e60

  • SHA1

    a1f6517726c9dc0f3d588b947e2aaeb4f849f58c

  • SHA256

    472a703381c8fe89f83b0fe4d7960b0942c5694054ba94dd85c249c4c702e0cd

  • SHA512

    7dad8ec1c5040112deee48ef6dbd56e7aac3db65dee11568f5e9fea96b33b2b6030f560c834ba51dcb0cb98eb837c2638e7f9c8b39c1f46395bd8259c88f8937

  • SSDEEP

    384:zZizC2pKXg9eH58VkRS/oFGPikzhlZBBmBi1S0f9EKR4VWjs5anwNmJ8sxSvpphB:z/wJevBzM6RB

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

btrd

Decoy

everslane.com

prairieviewelectric.online

dszvhgd.com

papamuch.com

8129k.vip

jeffreestar.gold

bestguestrentals.com

nvzhuang1.net

anangtoto.com

yxfgor.top

practicalpoppers.com

thebestanglephotography.online

koormm.top

criika.net

audioflow.online

380747.net

jiuguanwang.net

bloxequities.com

v321c.com

sugar.monster

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3560
    • C:\Users\Admin\AppData\Local\Temp\PURCHASEDORDEROFENG091.exe
      "C:\Users\Admin\AppData\Local\Temp\PURCHASEDORDEROFENG091.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASEDORDEROFENG091" /t REG_SZ /F /D "C:\Users\Admin\Documents\PURCHASEDORDEROFENG091.pif"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4856
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "PURCHASEDORDEROFENG091" /t REG_SZ /F /D "C:\Users\Admin\Documents\PURCHASEDORDEROFENG091.pif"
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:468
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c Copy "C:\Users\Admin\AppData\Local\Temp\PURCHASEDORDEROFENG091.exe" "C:\Users\Admin\Documents\PURCHASEDORDEROFENG091.pif"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1860
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2492
    • C:\Windows\SysWOW64\raserver.exe
      "C:\Windows\SysWOW64\raserver.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1452
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1452-21-0x0000000000080000-0x000000000009F000-memory.dmp

    Filesize

    124KB

  • memory/1452-24-0x00000000009D0000-0x00000000009FF000-memory.dmp

    Filesize

    188KB

  • memory/1452-23-0x0000000000080000-0x000000000009F000-memory.dmp

    Filesize

    124KB

  • memory/1956-10-0x00000000064B0000-0x0000000006516000-memory.dmp

    Filesize

    408KB

  • memory/1956-15-0x0000000074640000-0x0000000074DF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1956-5-0x0000000004C60000-0x0000000004C6A000-memory.dmp

    Filesize

    40KB

  • memory/1956-6-0x0000000004F50000-0x0000000004FC6000-memory.dmp

    Filesize

    472KB

  • memory/1956-7-0x0000000004DA0000-0x0000000004DBE000-memory.dmp

    Filesize

    120KB

  • memory/1956-8-0x00000000061E0000-0x0000000006274000-memory.dmp

    Filesize

    592KB

  • memory/1956-9-0x0000000006310000-0x00000000063AC000-memory.dmp

    Filesize

    624KB

  • memory/1956-0-0x000000007464E000-0x000000007464F000-memory.dmp

    Filesize

    4KB

  • memory/1956-1-0x00000000002B0000-0x00000000002BC000-memory.dmp

    Filesize

    48KB

  • memory/1956-4-0x0000000074640000-0x0000000074DF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1956-2-0x0000000005330000-0x00000000058D4000-memory.dmp

    Filesize

    5.6MB

  • memory/1956-3-0x0000000004C80000-0x0000000004D12000-memory.dmp

    Filesize

    584KB

  • memory/2492-18-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2492-19-0x0000000002EC0000-0x0000000002ED4000-memory.dmp

    Filesize

    80KB

  • memory/2492-16-0x0000000002B70000-0x0000000002EBA000-memory.dmp

    Filesize

    3.3MB

  • memory/2492-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3560-20-0x0000000008AC0000-0x0000000008C14000-memory.dmp

    Filesize

    1.3MB

  • memory/3560-25-0x0000000008AC0000-0x0000000008C14000-memory.dmp

    Filesize

    1.3MB

  • memory/3560-29-0x0000000002D60000-0x0000000002E3C000-memory.dmp

    Filesize

    880KB