Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2024 17:00

General

  • Target

    rrk590123c.exe

  • Size

    297KB

  • MD5

    668a6855d8ce2efa9f23170bd7c5ac5e

  • SHA1

    0586ab192841fa947644184d667e81640ea25957

  • SHA256

    7dcb1ee79eae7ff95e311aa25d0f73f1d89c266a8f609dfd31782054b03c3de6

  • SHA512

    7070bb748df0445b88c2438dd738967d61f10523a148e6df84088dd0baba36c5a4861685056f024b2f55b8f3bf1a7021a8a5adc43ed7d0580937d1de8c5a87de

  • SSDEEP

    6144:hsg/lR8Nb2PKfOlQQ7b5q9lDY5m0cW6qpzt1lOMzxGusc7d5iv2:hsg/lmbjzjtMiO5iv2

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

k1rc

Decoy

manchesterflowerwalls.com

hyperhostns.info

leverj.exchange

bringcovidhome.com

natalieball.com

glaseye.com

buyersmeetsellers.net

dronerealestate.net

calfwag.com

hoodhippy.com

prophunting.com

yange03.com

ffpgv.top

valengz.com

handbagsbreeze.com

excellencepi.com

iopsms.xyz

farmacykauai.com

dmarc.press

aridham.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\AppData\Local\Temp\rrk590123c.exe
      "C:\Users\Admin\AppData\Local\Temp\rrk590123c.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Users\Admin\AppData\Local\Temp\rrk590123c.exe
        "C:\Users\Admin\AppData\Local\Temp\rrk590123c.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2952
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\rrk590123c.exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1196-6-0x0000000005150000-0x000000000524E000-memory.dmp

    Filesize

    1016KB

  • memory/1196-11-0x0000000005150000-0x000000000524E000-memory.dmp

    Filesize

    1016KB

  • memory/1196-15-0x0000000006B60000-0x0000000006CC0000-memory.dmp

    Filesize

    1.4MB

  • memory/1196-16-0x0000000006B60000-0x0000000006CC0000-memory.dmp

    Filesize

    1.4MB

  • memory/1196-18-0x0000000006B60000-0x0000000006CC0000-memory.dmp

    Filesize

    1.4MB

  • memory/1924-2-0x0000000000290000-0x0000000000292000-memory.dmp

    Filesize

    8KB

  • memory/1924-1-0x0000000000090000-0x0000000000190000-memory.dmp

    Filesize

    1024KB

  • memory/2040-10-0x000000004A010000-0x000000004A05C000-memory.dmp

    Filesize

    304KB

  • memory/2040-9-0x000000004A010000-0x000000004A05C000-memory.dmp

    Filesize

    304KB

  • memory/2952-3-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2952-5-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB