Analysis

  • max time kernel
    13s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-10-2024 08:12

General

  • Target

    faktura proforma pdf.exe

  • Size

    612KB

  • MD5

    a2769ba56f8b84de34deee154f4bfba2

  • SHA1

    01771e5df223fac2315e8ab9ba72234a1a41f0ba

  • SHA256

    9f7da651412232824c868086dd48a7d63af0dbb007cef4db8c24edda9b2fcdbb

  • SHA512

    57ae3e2b4c4b47a6662c6ff8e91d95d0c807cf6a25757c9f6e4cb4f2f377746ac468cdaa1bd298679a6d70bc4dd91ef3f78444f8d7b9cdfcfdf71d3a428f2752

  • SSDEEP

    12288:lCfia8t/w3ENiFovuGAS1WDv8mMrIJTxzDYKTX+grvLU2PI5WytkT7:lYibt/w3ESwXAS1U8brIJdXJugDYMI5C

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

gy15

Decoy

hairsdeals.today

acob-saaad.buzz

9955.club

gild6222.vip

nline-shopping-56055.bond

lmadulles.top

utemodels.info

ighdd4675.online

nqqkk146.xyz

avasales.online

ortas-de-madeira.today

haad.xyz

races-dental-splints-15439.bond

hilohcreekpemf.online

rrivalgetaways.info

orktoday-2507-02-sap.click

eceriyayinlari.xyz

lsurfer.click

aston-saaae.buzz

etrot.pro

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\faktura proforma pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\faktura proforma pdf.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:808
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\xmAdkuQjxrS.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      PID:3272
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xmAdkuQjxrS" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDEB7.tmp"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4884
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:3080
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      1⤵
        PID:3588
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          2⤵
            PID:3720

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bfmaa23r.4q4.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\tmpDEB7.tmp

          Filesize

          1KB

          MD5

          35b5e71603985caab627b44d9ff554b3

          SHA1

          2d37a54e45ada19a334d35dbdb1174b8cb112e60

          SHA256

          495e5691fc4bebc1d377eeed671280267f05464fc64e5d2406d9db9e52d6f411

          SHA512

          e5fbf63fdac54dc441845277adae278ce785b5523f29301648a1a293990a7501f16f7583e3c26df7e5f0e93c59372bbbcda5cc366e95c5a37e823e2321595962

        • memory/808-4-0x0000000004E80000-0x0000000004E8A000-memory.dmp

          Filesize

          40KB

        • memory/808-9-0x00000000743D0000-0x0000000074B80000-memory.dmp

          Filesize

          7.7MB

        • memory/808-33-0x00000000743D0000-0x0000000074B80000-memory.dmp

          Filesize

          7.7MB

        • memory/808-6-0x0000000004FA0000-0x000000000503C000-memory.dmp

          Filesize

          624KB

        • memory/808-5-0x00000000743D0000-0x0000000074B80000-memory.dmp

          Filesize

          7.7MB

        • memory/808-7-0x0000000006050000-0x000000000606E000-memory.dmp

          Filesize

          120KB

        • memory/808-8-0x00000000743DE000-0x00000000743DF000-memory.dmp

          Filesize

          4KB

        • memory/808-1-0x0000000000290000-0x000000000032E000-memory.dmp

          Filesize

          632KB

        • memory/808-10-0x00000000026E0000-0x0000000002756000-memory.dmp

          Filesize

          472KB

        • memory/808-0-0x00000000743DE000-0x00000000743DF000-memory.dmp

          Filesize

          4KB

        • memory/808-3-0x0000000004CF0000-0x0000000004D82000-memory.dmp

          Filesize

          584KB

        • memory/808-2-0x00000000052A0000-0x0000000005844000-memory.dmp

          Filesize

          5.6MB

        • memory/3080-26-0x0000000001700000-0x0000000001A4A000-memory.dmp

          Filesize

          3.3MB

        • memory/3080-19-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3080-35-0x00000000011B0000-0x00000000011C4000-memory.dmp

          Filesize

          80KB

        • memory/3080-34-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3272-15-0x0000000002860000-0x0000000002896000-memory.dmp

          Filesize

          216KB

        • memory/3272-56-0x0000000004E20000-0x0000000004E30000-memory.dmp

          Filesize

          64KB

        • memory/3272-42-0x0000000006180000-0x000000000619E000-memory.dmp

          Filesize

          120KB

        • memory/3272-43-0x00000000062A0000-0x00000000062EC000-memory.dmp

          Filesize

          304KB

        • memory/3272-70-0x00000000743D0000-0x0000000074B80000-memory.dmp

          Filesize

          7.7MB

        • memory/3272-24-0x0000000005250000-0x00000000052B6000-memory.dmp

          Filesize

          408KB

        • memory/3272-25-0x00000000052C0000-0x0000000005326000-memory.dmp

          Filesize

          408KB

        • memory/3272-21-0x00000000743D0000-0x0000000074B80000-memory.dmp

          Filesize

          7.7MB

        • memory/3272-23-0x00000000051B0000-0x00000000051D2000-memory.dmp

          Filesize

          136KB

        • memory/3272-20-0x00000000743D0000-0x0000000074B80000-memory.dmp

          Filesize

          7.7MB

        • memory/3272-18-0x0000000005460000-0x0000000005A88000-memory.dmp

          Filesize

          6.2MB

        • memory/3272-17-0x00000000743D0000-0x0000000074B80000-memory.dmp

          Filesize

          7.7MB

        • memory/3272-44-0x000000007EE90000-0x000000007EEA0000-memory.dmp

          Filesize

          64KB

        • memory/3272-58-0x0000000007360000-0x0000000007403000-memory.dmp

          Filesize

          652KB

        • memory/3272-57-0x0000000006730000-0x000000000674E000-memory.dmp

          Filesize

          120KB

        • memory/3272-36-0x0000000005C50000-0x0000000005FA4000-memory.dmp

          Filesize

          3.3MB

        • memory/3272-60-0x00000000074A0000-0x00000000074BA000-memory.dmp

          Filesize

          104KB

        • memory/3272-59-0x0000000007AF0000-0x000000000816A000-memory.dmp

          Filesize

          6.5MB

        • memory/3272-61-0x0000000007510000-0x000000000751A000-memory.dmp

          Filesize

          40KB

        • memory/3272-46-0x0000000074C50000-0x0000000074C9C000-memory.dmp

          Filesize

          304KB

        • memory/3272-45-0x0000000006750000-0x0000000006782000-memory.dmp

          Filesize

          200KB

        • memory/3272-62-0x0000000007720000-0x00000000077B6000-memory.dmp

          Filesize

          600KB

        • memory/3272-63-0x00000000076A0000-0x00000000076B1000-memory.dmp

          Filesize

          68KB

        • memory/3272-64-0x00000000076D0000-0x00000000076DE000-memory.dmp

          Filesize

          56KB

        • memory/3272-66-0x00000000077E0000-0x00000000077FA000-memory.dmp

          Filesize

          104KB

        • memory/3272-67-0x00000000077C0000-0x00000000077C8000-memory.dmp

          Filesize

          32KB

        • memory/3272-65-0x00000000076E0000-0x00000000076F4000-memory.dmp

          Filesize

          80KB

        • memory/3448-37-0x00000000089D0000-0x0000000008AB8000-memory.dmp

          Filesize

          928KB

        • memory/3448-73-0x00000000089D0000-0x0000000008AB8000-memory.dmp

          Filesize

          928KB

        • memory/3448-76-0x0000000008B30000-0x0000000008C3F000-memory.dmp

          Filesize

          1.1MB

        • memory/3588-71-0x0000000000200000-0x000000000020C000-memory.dmp

          Filesize

          48KB

        • memory/3588-72-0x0000000000750000-0x000000000077F000-memory.dmp

          Filesize

          188KB