Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2024 13:25

General

  • Target

    acb23b92beb1de31d7175c94f94854887bc0b2adb90faddc89bf1b14b1bd1a4b.exe

  • Size

    1.0MB

  • MD5

    e9e768aa357a7e34348c69e41444964d

  • SHA1

    4930b85e20b7967cf0afb1d9ae9ae57ca4d373c9

  • SHA256

    acb23b92beb1de31d7175c94f94854887bc0b2adb90faddc89bf1b14b1bd1a4b

  • SHA512

    6394564277e7077d9e326cc0f34f3c6ef945ed4d2e6bd812daaef879bb957edd4c8032df14774328799c692cbfb1f784fbf3580e65effdc5d2d42f124f62bb3a

  • SSDEEP

    12288:LKLRCoZzl+CN6XYt8GjKtzp422BxYLWM7Wi9h77:LiCoZzkg8tzpH2BK17L9h77

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

igbn

Decoy

daolangfans.com

creatievecontentpeople.com

cargizmos.net

azure1224.xyz

shopahava.com

recursum.com

rumblerain.com

betmonde396.com

webinarcerdaskanindonesia.com

telemaca.com

hellohurt.com

peaceprairie.com

johntheonlinearborist.com

pilotbxprt.store

creatingsobriety.com

getrightspt.com

104456.com

travelsofwray.com

americagroupperu.com

silberscore.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\acb23b92beb1de31d7175c94f94854887bc0b2adb90faddc89bf1b14b1bd1a4b.exe
      "C:\Users\Admin\AppData\Local\Temp\acb23b92beb1de31d7175c94f94854887bc0b2adb90faddc89bf1b14b1bd1a4b.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
        "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2188
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 268
        3⤵
        • Program crash
        PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\AddInProcess32.exe

    Filesize

    41KB

    MD5

    6a673bfc3b67ae9782cb31af2f234c68

    SHA1

    7544e89566d91e84e3cd437b9a073e5f6b56566e

    SHA256

    978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

    SHA512

    72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

  • memory/1200-30-0x0000000004E40000-0x0000000004F22000-memory.dmp

    Filesize

    904KB

  • memory/1200-23-0x0000000004E40000-0x0000000004F22000-memory.dmp

    Filesize

    904KB

  • memory/2188-21-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2188-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2188-22-0x0000000000180000-0x0000000000194000-memory.dmp

    Filesize

    80KB

  • memory/2188-19-0x00000000009C0000-0x0000000000CC3000-memory.dmp

    Filesize

    3.0MB

  • memory/2188-16-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2188-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2188-11-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2572-18-0x0000000074AD0000-0x00000000751BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2572-3-0x0000000074AD0000-0x00000000751BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2572-5-0x0000000002040000-0x000000000205A000-memory.dmp

    Filesize

    104KB

  • memory/2572-7-0x0000000000530000-0x0000000000536000-memory.dmp

    Filesize

    24KB

  • memory/2572-6-0x0000000074AD0000-0x00000000751BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2572-0-0x0000000074ADE000-0x0000000074ADF000-memory.dmp

    Filesize

    4KB

  • memory/2572-2-0x00000000004D0000-0x0000000000500000-memory.dmp

    Filesize

    192KB

  • memory/2572-1-0x0000000000890000-0x000000000099E000-memory.dmp

    Filesize

    1.1MB

  • memory/2804-25-0x0000000000F40000-0x0000000000F54000-memory.dmp

    Filesize

    80KB

  • memory/2804-24-0x0000000000F40000-0x0000000000F54000-memory.dmp

    Filesize

    80KB

  • memory/2804-27-0x0000000000F40000-0x0000000000F54000-memory.dmp

    Filesize

    80KB