Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 07:47
Behavioral task
behavioral1
Sample
Formbook.exe
Resource
win7-20240708-en
General
-
Target
Formbook.exe
-
Size
177KB
-
MD5
325e9bc40c665d845e9edd875631ec48
-
SHA1
6f325ce61e9d8916cced15919cbd84fce584e14f
-
SHA256
c3b9bd6a3c03e763f6255c275cbb3a068de6feef7417d18b7a3e92c6b28753e5
-
SHA512
02760fc7cd93075f8fdb35e0a87dfee062c718fe03a28408da6a03d37eb6e39a3388c0c01611cee8d28422b930346c92f4242538a29daa8ad0a3b5cdf8d69dc4
-
SSDEEP
3072:FamFfATiz/CDWALN/Prl8QCUaIUZt/nmYVo+jVMDlMUqc:TJpCnN/58HUaIUZAA/jVMDXq
Malware Config
Extracted
formbook
t65q
0oaArVDIAeJVRaUXOQ==
LNDb+polOuZWRaUXOQ==
JtmsCzRHeEwzeL2B
vnqa1XjmKA+FvOMtYjCfpA==
PObZY38RZFy5hI+UBU5z
HMWF1duWpoWGMkD8jx65AUXSWw==
q1a4x9u/45pUzx7JtUw=
eiBXszdDjIicMZGUBU5z
2ZGTqUfi76hl6hgZwPHQTHU4
yXEFKTk2ZFqpgJhtW7TlCzU88p5IsBE=
4pKcIzzkIudWRaUXOQ==
DLJZgItne1U4t/oxYjCfpA==
Gtx+wM18vK+EJGWUjf7cib+389qAog==
AZhvu+juGvcbvwuGswJ7
Is51z+aNxKdZxgvJaaSc0TM5Ondl
/J5wws+U0rZJfqUJYjCfpA==
rYz0dRg7cEwzeL2B
ZQN98UzJR6VFhog=
bSdHfxuEokkzeL2B
/5w7hZ1okomXNpqMv1s=
ErKeAxjVFO6aDTc3z9lHwiE=
cRScM9MCRCROR4eUBU5z
m1w9yOR0p4hI0R7JtUw=
0YjfU/IkakwzeL2B
p1tJwOKjt4WMQ3/q0HZvoQ==
rV5lhfwtiSNwXJo=
L9L9SOdAXAlGISGkwxa8AUXSWw==
dTdSkxtanJCuZKKeZbjnFx8uX55IsBE=
A6k1u1aFw7rP6e+Y
2ZLBB53YDvEizx7JtUw=
vnw9hWhuH+2BnE2QTG9En7Ay
6JjwNtBHe2wBHDvrhBm5AUXSWw==
CbbdIWvBTcU4bw==
J9h2oLWf/4aGK09T8kQ=
mEATdY41Zm5BuOT75gSt+5RmmY0=
E7yqv0mstJpc2Bhild2LAUXSWw==
E8paf45wfDdAFVJlftlHwiE=
14IGmD1gaQyyq8day+7QTHU4
CaSM/w6pyagHr8uW
iKVHPeRV/bBKdg==
zYbsZBF4saZBRaUXOQ==
EqL9UdglIr3RWII=
pUxgegyP/bBKdg==
fyyuRt3iHgL/wOPkIEBq
1nUHmTFJZyAf3xsRAKK+Nyk=
i0CfE5mMxa+GCTlrpVNzapRmmY0=
6qAHgwTxAcDEZMKow1U=
hpU1fhQ/TC7GESRQcciGAUXSWw==
lj4Tfpt3iEA/2R7JtUw=
gxaJCq3OAaVFhog=
PuTyi7JTfDKv2Bbck+nQTHU4
u1ioD6XW65kjhR7JtUw=
HtDFQF0cPRkizx7JtUw=
w3oaYWolZT7LCydmgtlHwiE=
iTK+9SVBXfWKqt6J
8aFD2IbH9NlQRaUXOQ==
Peq2DzEsUDxc6Qc0msvZsw==
Xwqd4O+ixp05aIf+YjCfpA==
LNiTAibL6qwbDiCjzxm5AUXSWw==
cRvF8A0XPhgp5iEm1dlHwiE=
+JddlJlls3wFKji85Qit+JRmmY0=
3JiRsk+9v5CAVXU+x+rQTHU4
L9oBKsVajHtMrthPhKIZfzeGBXVUjbukeg==
uGI4q8d0hFtjNHlPy+7QTHU4
promedsecurity.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2432-2-0x00000000000D0000-0x00000000000FD000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Formbook.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\International\Geo\Nation Formbook.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Formbook.exedescription pid process target process PID 2432 set thread context of 1204 2432 Formbook.exe Explorer.EXE -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2752 2696 WerFault.exe msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
msiexec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Formbook.exepid process 2432 Formbook.exe 2432 Formbook.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
Formbook.exepid process 2432 Formbook.exe 2432 Formbook.exe 2432 Formbook.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Formbook.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2432 Formbook.exe Token: SeShutdownPrivilege 1204 Explorer.EXE Token: SeShutdownPrivilege 1204 Explorer.EXE Token: SeShutdownPrivilege 1204 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Explorer.EXEmsiexec.exedescription pid process target process PID 1204 wrote to memory of 2696 1204 Explorer.EXE msiexec.exe PID 1204 wrote to memory of 2696 1204 Explorer.EXE msiexec.exe PID 1204 wrote to memory of 2696 1204 Explorer.EXE msiexec.exe PID 1204 wrote to memory of 2696 1204 Explorer.EXE msiexec.exe PID 1204 wrote to memory of 2696 1204 Explorer.EXE msiexec.exe PID 1204 wrote to memory of 2696 1204 Explorer.EXE msiexec.exe PID 1204 wrote to memory of 2696 1204 Explorer.EXE msiexec.exe PID 2696 wrote to memory of 2752 2696 msiexec.exe WerFault.exe PID 2696 wrote to memory of 2752 2696 msiexec.exe WerFault.exe PID 2696 wrote to memory of 2752 2696 msiexec.exe WerFault.exe PID 2696 wrote to memory of 2752 2696 msiexec.exe WerFault.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\Formbook.exe"C:\Users\Admin\AppData\Local\Temp\Formbook.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 2683⤵
- Program crash
PID:2752
-
-