Analysis
-
max time kernel
57s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 07:47
Behavioral task
behavioral1
Sample
Formbook.exe
Resource
win7-20240708-en
General
-
Target
Formbook.exe
-
Size
177KB
-
MD5
325e9bc40c665d845e9edd875631ec48
-
SHA1
6f325ce61e9d8916cced15919cbd84fce584e14f
-
SHA256
c3b9bd6a3c03e763f6255c275cbb3a068de6feef7417d18b7a3e92c6b28753e5
-
SHA512
02760fc7cd93075f8fdb35e0a87dfee062c718fe03a28408da6a03d37eb6e39a3388c0c01611cee8d28422b930346c92f4242538a29daa8ad0a3b5cdf8d69dc4
-
SSDEEP
3072:FamFfATiz/CDWALN/Prl8QCUaIUZt/nmYVo+jVMDlMUqc:TJpCnN/58HUaIUZAA/jVMDXq
Malware Config
Extracted
formbook
t65q
0oaArVDIAeJVRaUXOQ==
LNDb+polOuZWRaUXOQ==
JtmsCzRHeEwzeL2B
vnqa1XjmKA+FvOMtYjCfpA==
PObZY38RZFy5hI+UBU5z
HMWF1duWpoWGMkD8jx65AUXSWw==
q1a4x9u/45pUzx7JtUw=
eiBXszdDjIicMZGUBU5z
2ZGTqUfi76hl6hgZwPHQTHU4
yXEFKTk2ZFqpgJhtW7TlCzU88p5IsBE=
4pKcIzzkIudWRaUXOQ==
DLJZgItne1U4t/oxYjCfpA==
Gtx+wM18vK+EJGWUjf7cib+389qAog==
AZhvu+juGvcbvwuGswJ7
Is51z+aNxKdZxgvJaaSc0TM5Ondl
/J5wws+U0rZJfqUJYjCfpA==
rYz0dRg7cEwzeL2B
ZQN98UzJR6VFhog=
bSdHfxuEokkzeL2B
/5w7hZ1okomXNpqMv1s=
ErKeAxjVFO6aDTc3z9lHwiE=
cRScM9MCRCROR4eUBU5z
m1w9yOR0p4hI0R7JtUw=
0YjfU/IkakwzeL2B
p1tJwOKjt4WMQ3/q0HZvoQ==
rV5lhfwtiSNwXJo=
L9L9SOdAXAlGISGkwxa8AUXSWw==
dTdSkxtanJCuZKKeZbjnFx8uX55IsBE=
A6k1u1aFw7rP6e+Y
2ZLBB53YDvEizx7JtUw=
vnw9hWhuH+2BnE2QTG9En7Ay
6JjwNtBHe2wBHDvrhBm5AUXSWw==
CbbdIWvBTcU4bw==
J9h2oLWf/4aGK09T8kQ=
mEATdY41Zm5BuOT75gSt+5RmmY0=
E7yqv0mstJpc2Bhild2LAUXSWw==
E8paf45wfDdAFVJlftlHwiE=
14IGmD1gaQyyq8day+7QTHU4
CaSM/w6pyagHr8uW
iKVHPeRV/bBKdg==
zYbsZBF4saZBRaUXOQ==
EqL9UdglIr3RWII=
pUxgegyP/bBKdg==
fyyuRt3iHgL/wOPkIEBq
1nUHmTFJZyAf3xsRAKK+Nyk=
i0CfE5mMxa+GCTlrpVNzapRmmY0=
6qAHgwTxAcDEZMKow1U=
hpU1fhQ/TC7GESRQcciGAUXSWw==
lj4Tfpt3iEA/2R7JtUw=
gxaJCq3OAaVFhog=
PuTyi7JTfDKv2Bbck+nQTHU4
u1ioD6XW65kjhR7JtUw=
HtDFQF0cPRkizx7JtUw=
w3oaYWolZT7LCydmgtlHwiE=
iTK+9SVBXfWKqt6J
8aFD2IbH9NlQRaUXOQ==
Peq2DzEsUDxc6Qc0msvZsw==
Xwqd4O+ixp05aIf+YjCfpA==
LNiTAibL6qwbDiCjzxm5AUXSWw==
cRvF8A0XPhgp5iEm1dlHwiE=
+JddlJlls3wFKji85Qit+JRmmY0=
3JiRsk+9v5CAVXU+x+rQTHU4
L9oBKsVajHtMrthPhKIZfzeGBXVUjbukeg==
uGI4q8d0hFtjNHlPy+7QTHU4
promedsecurity.com
Signatures
-
Xloader payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1672-2-0x0000000000E40000-0x0000000000E6D000-memory.dmp xloader behavioral2/memory/4180-8-0x00000000012F0000-0x000000000131D000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Formbook.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Formbook.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Formbook.exerundll32.exedescription pid process target process PID 1672 set thread context of 3456 1672 Formbook.exe Explorer.EXE PID 4180 set thread context of 3456 4180 rundll32.exe Explorer.EXE -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Formbook.exerundll32.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Formbook.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
Formbook.exerundll32.exepid process 1672 Formbook.exe 1672 Formbook.exe 1672 Formbook.exe 1672 Formbook.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe 4180 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3456 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Formbook.exerundll32.exepid process 1672 Formbook.exe 1672 Formbook.exe 1672 Formbook.exe 4180 rundll32.exe 4180 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Formbook.exerundll32.exedescription pid process Token: SeDebugPrivilege 1672 Formbook.exe Token: SeDebugPrivilege 4180 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Explorer.EXErundll32.exedescription pid process target process PID 3456 wrote to memory of 4180 3456 Explorer.EXE rundll32.exe PID 3456 wrote to memory of 4180 3456 Explorer.EXE rundll32.exe PID 3456 wrote to memory of 4180 3456 Explorer.EXE rundll32.exe PID 4180 wrote to memory of 4428 4180 rundll32.exe cmd.exe PID 4180 wrote to memory of 4428 4180 rundll32.exe cmd.exe PID 4180 wrote to memory of 4428 4180 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\Formbook.exe"C:\Users\Admin\AppData\Local\Temp\Formbook.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Formbook.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4428
-
-