Analysis

  • max time kernel
    148s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 14:53

General

  • Target

    6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe

  • Size

    1.0MB

  • MD5

    5097fe796d4bca99a3d79998c27116cd

  • SHA1

    2e78d6968f547a5d70e5795ce89cbd51a06a90fa

  • SHA256

    6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f

  • SHA512

    d5c8c470c6496e4bc0fc1781f59cbd19f7a96d8cc98d3a5a5956123761bac1f7a635db3b908050652cb42a7ee2f0cd924cb5809239291d5ac3b5c2d723389180

  • SSDEEP

    24576:hN/BUBb+tYjBFHNhz6FI9Dh7WinTX1zJ54D+q0lPBzkFy:jpUlRhPzna4X1zJ5w+JPBAy

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

o52o

Decoy

ckroom.xyz

apanstock.online

6dtd8.vip

phone-in-installment-kz.today

ichaellee.info

mpresamkt38.online

ivein.today

78cx465vo.autos

avannahholcomb.shop

eochen008.top

rcraft.net

eth-saaae.buzz

ifxz.info

flegendarycap50.online

reon-network.xyz

ee.zone

ameralife.net

5en4.shop

eal-delivery-34026.bond

anion.app

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    PID:3404
    • C:\Users\Admin\AppData\Local\Temp\6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe
      "C:\Users\Admin\AppData\Local\Temp\6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4476
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rwwk.vbe"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ipconfig /release
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4960
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /release
            5⤵
            • System Location Discovery: System Language Discovery
            • Gathers network information
            PID:3344
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c gbkusncub.ppt hcmdvu.msc
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4944
          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\gbkusncub.ppt
            gbkusncub.ppt hcmdvu.msc
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1276
            • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
              "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
              6⤵
              • Executes dropped EXE
              PID:4328
            • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
              "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1956
              • C:\Windows\SysWOW64\help.exe
                "C:\Windows\SysWOW64\help.exe"
                7⤵
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:232
                • C:\Windows\SysWOW64\cmd.exe
                  /c del "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5008
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ipconfig /renew
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4840
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /renew
            5⤵
            • System Location Discovery: System Language Discovery
            • Gathers network information
            PID:3272
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:4144
      • C:\Windows\SysWOW64\autofmt.exe
        "C:\Windows\SysWOW64\autofmt.exe"
        2⤵
          PID:4592
        • C:\Windows\SysWOW64\autofmt.exe
          "C:\Windows\SysWOW64\autofmt.exe"
          2⤵
            PID:464
          • C:\Windows\SysWOW64\autofmt.exe
            "C:\Windows\SysWOW64\autofmt.exe"
            2⤵
              PID:2184
            • C:\Windows\SysWOW64\autofmt.exe
              "C:\Windows\SysWOW64\autofmt.exe"
              2⤵
                PID:4124

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\chkblaxft.docx

              Filesize

              522B

              MD5

              e51ef2d4160c0f41b42ea8f38dedaa45

              SHA1

              aca488c15e88ad25e089eb374b6c1ead4c800e68

              SHA256

              4b7eabb2302fec9292a5aeb5949d54c0744c57de6cc527fb285441d29fae3c24

              SHA512

              4bf85824b9f0447e175fef3a731a514df19470b45611df683d6aafb5844d1dd23512ef092480ff715978c4e27df129cea355493fa56d2407a24dc3b993b403e0

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cucii.ppt

              Filesize

              562B

              MD5

              0a597abaa9895b8a6e2a1e01c1d2e207

              SHA1

              f37d888d098be4d11e5c170fb8e1e7470d91290c

              SHA256

              9d7b071af5a275c98a994d56ee211e646c8aa2cba39fb37fa20d78f73179552f

              SHA512

              9686f6182a3946c9013ea0b0147cc0ead5ecbe529645e6e70faf5779acb72f48849e9cae7c2519fd497a169d9b7a7f2acef990a85401727c42ce4a6994703b2b

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dddrmcvn.das

              Filesize

              511B

              MD5

              685b8082e059988e8f569a7c957d67cc

              SHA1

              6402355c5a4a7514a39fee6ee37c46902a4efc24

              SHA256

              2b14a53107fec583b8ecb5055d194a2c5997491cb91a7cddf989dfd787fd577d

              SHA512

              5692ac0f30dac8f18c0c0d52578cda99ce2f3c9656b5b2c6437dda4e5c6c014e8f94f5584785c50847346be963b737e3fce0c727884955c01c9129eff2154a44

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ebxc.exe

              Filesize

              570B

              MD5

              bb96fa2eb279e1fa70ee33b80ddf5486

              SHA1

              d4eca17fd2b78bfb8264295e6f254255649ca3af

              SHA256

              bb828b95aa2bef4d424ae1ecc976435ad053b06ec5e89af75de2763b0cce523c

              SHA512

              bd81985876a5cf9d4c579a2f0ea7738b28df12c1f2a9c4c1a8c12ace89b1a32bdf098987b807435f2cc950695015b7069b61360f55d9e3ba711359609a7e7b04

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\edfpst.jpg

              Filesize

              543B

              MD5

              f7490a6265f334876342496600dfca5c

              SHA1

              e79e42617ba61c13293b3ad44d2fdcb547fd75f3

              SHA256

              b61b5dbc2284545df43d06b8434819b95bcc6ae4e5e22617f05a97e5ac2fef17

              SHA512

              b2ee0fd841a658df4ccb2db1d63a31aeebf47baa4a3ff6d8fd956ad76531e131b61a637b2ba49e1d161b6950c06e838b61bc19bf840832c68cc559649acc9c06

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fkawpxd.ppt

              Filesize

              514B

              MD5

              3d8dd208a1bc990063b574044319ff30

              SHA1

              8a028e38eecaaa27c448ec281bfc1a00045895b5

              SHA256

              84d1770a96d4802e652390702f6022d144238548a7f0f6a80497975165cfe2c3

              SHA512

              62e46b51fe8569d5c24a96f398ab826457f5ed2a98fa7af27e012bbad7a83c6d6a0d31338192d0276617c2c99314bb71ab13d995db4118ba54c5909b706467cf

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fuvdg.msc

              Filesize

              529B

              MD5

              2ddf35f6efa65e7b1e286e3839980288

              SHA1

              dcbcfd1ed8d5a63e07b89bdf65ec39af1373c4f8

              SHA256

              8da7643f1455aed90195609e344014ada2f338c6f7e59c68faef3a7714f84b3b

              SHA512

              980bb720a6326d2f60e7e3e70ef65b3131b1166383cbc42b57d5474d03f884ab271da8847f2679d640931813cf27c88800b9a1f780a6f6912e9cd98dc948e887

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\gbkusncub.ppt

              Filesize

              925KB

              MD5

              0adb9b817f1df7807576c2d7068dd931

              SHA1

              4a1b94a9a5113106f40cd8ea724703734d15f118

              SHA256

              98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b

              SHA512

              883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\gkgmtswhmc.jpg

              Filesize

              513B

              MD5

              45d2330198499ebfd1b73e984826fe5e

              SHA1

              6178824c68fb54d2e79aa6914b517530628b8220

              SHA256

              7407261ce6f3f09ffb85b70a630d7d951e2bd88f709b7f504f2dbef21bd3dd6c

              SHA512

              86056988f1eee5339620c8906aaa4914718d3b8ceb6c69ae65401358dfab1ff66cda12de286770fe675104358d31b200a4d60b24f8c224ada2ac0a4640fb359f

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\havvtivnup.bmp

              Filesize

              540B

              MD5

              5a33acb108a1c219ed1194d8381cd40a

              SHA1

              d55846b97a021bbe4dcf490085a0824ad2c38961

              SHA256

              f26513a135fa2e295c130a54290838e954b668d5aa013887f12b09ca0a735e93

              SHA512

              a18fd243b2463ff6ea3cb61c7347cfa3c66f757647e9185a8a65114de11def9bd0ca40d8bc08da3ed0f45f913b948a7e377367d1d93739beb2d593e5496229c5

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ijqn.mgf

              Filesize

              351KB

              MD5

              fae6ee35c0f5ac2dc4885c0de8e88032

              SHA1

              587bf6f4105d4420762c463ba33e9e3ba677e85f

              SHA256

              4db090b6f1cd2501c929b31c2e29d4d0a4ddf1e81be6800e763d8c45bea8744d

              SHA512

              1ce62d900017dd4545023acc3ca32daee7eb454a6144c99958d57e88838402013854f410b8be1fb5d607819c48ba72fefecc11d2c78a81408855bf3899e04b38

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\jqgrvgmurv.docx

              Filesize

              581B

              MD5

              16fa357e6e8840d33742a7717112abd8

              SHA1

              866906ce593fbc4b7a27f7c4d6ed172a225b0d50

              SHA256

              6b5ea4f4f6718ff1f3ec6b8c7f6518f447de4cea2ab2dac8a5371202487b7939

              SHA512

              a4d39e318aabee034e1225ed91c7ea06f1cd93b013cde0ef34bd6e3b2ce4719615efe7f9da98611d872d6fdf7062c4d13079776b27c75bb407332bc0cf443c5d

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ojmspoptet.mp3

              Filesize

              512B

              MD5

              470edbbda73def0f717d602dd7f78c56

              SHA1

              7aaa4969c33a33a770534cbabbeb8bb100106a7f

              SHA256

              bdb2567db5e89eeb431c2c4dfac73673e50b512258684cc67d9ccea0b2665b64

              SHA512

              47a1c4a233d6f52a7f756d17861552fda764b8d20cdbf61155f9445905ae7885050e39788b991692452ad71a76abb3765a7d20e5edd9838c6f77478c60550ce9

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwmk.xls

              Filesize

              637B

              MD5

              81feb95c89263dc75504bff8e06a5d90

              SHA1

              10454bc7f50a03508fa973874fbdcf433bd2d2f6

              SHA256

              85609bb1d624bcbc6db2a4db193e871d08c3c22f826f214dd34cb0cb3255b479

              SHA512

              029325eba2ddf3fc3c263a4719df6963433bab9bf4e568ee007662b62289ee69cf4e28566975679230d95e67f7697a28e4a300fdb27844c22fb810506b3306cf

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rwwk.vbe

              Filesize

              62KB

              MD5

              465381aa4e9b430423f61894f1ca3b7a

              SHA1

              cb87f2e9902cd6fd1559afaffbf93d427e2db11c

              SHA256

              2bd6653b99fc6535c1fcae63c1091f6bc227e20a72b0501f46eebee5e073677a

              SHA512

              8f38351940dbe639c447b06cd3004d421669d3f880c2e6c0db421a2774cc92a91d6aa66e58a27e688b49d6b6881eb4134ac20a707891630516da5ab7406666e0

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\sltfiwsc.dll

              Filesize

              42KB

              MD5

              9c3405160c29af9d745c01e85258d216

              SHA1

              28fc240be5dab0d20e11513c838039b1edfd8eae

              SHA256

              a197e7a9fe3a95b01be43406fa6b497d3e5a650af15665bcbeb1d47b5566b81d

              SHA512

              2c41e654c916ac53381742a29cdbd8ab00134f51d18799397ab86709eb89247b911f269dba871860f39f0b874e50773bd11fd085171ec2155a02e73e41e221e4

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\sltfiwsc.dll

              Filesize

              42KB

              MD5

              22f822322ddddb7e3169080058b05ae6

              SHA1

              125f3af3d92bf7852ad9936449c0f66d8ddc9b2a

              SHA256

              b5ae6a489465ef6111a05c70e4c455825da1aefa4da28672ab14708fc862c8e5

              SHA512

              9339143cde357a11eb17b2ea358a4f7c20d8ba1c013130cf5b135e5f31152e73216b3145a8d95bbdab463ccdde905b9156edce9f67efda6b0ae8161d3ea51946

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\tjif.icm

              Filesize

              528B

              MD5

              6f6df56c43cc6f1c193aad1c7ab82d06

              SHA1

              854f0199c9223417a3b6f82ada40afae98d144b6

              SHA256

              1ac36434bcaf1b5092e4c4ad1038cca646817fe26c12d9efea0d1ee708f5e7b6

              SHA512

              0ed1a079782d22bd1f4f5ef8c990cb1cdfb35042acb3e636e539468ea81d9c76ce9d8fbd9250e490b80808a19cffc151832279d630529a370aeb97452be9cf23

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xuncqfg.bin

              Filesize

              543B

              MD5

              f0e4edf30f267fbc4c721e275845377a

              SHA1

              04ecffcbfbaea9c4e75f005e19cfee8146c6bb34

              SHA256

              7d06a00c8471f7e712c435ef1ccbe2e9d84550db3cdc9849d33fd8fb9e49985b

              SHA512

              d90197c3f3a5fd8237cc5db49106763af311f4084b71a12e4755152e2fc740cfb1c1b9f3ae468bef489c3c1cdc776f576f98cbe82e740040fe09262aa9bde253

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xxmcsujdoo.das

              Filesize

              509B

              MD5

              1f26c199cc3920e832244b417095e92d

              SHA1

              0377748fa2da7c3d521b800f6f84b76f8f975418

              SHA256

              80489b9caf4a3e00356ae69a3d94ca7b5afb54e162e4cd2b2ab5f57dd91ea1ed

              SHA512

              dddd31c3d68cdafeb3fc5eeb54fcb8d5221db34c7afec1374c727f900971807a2e064828611f75ac58a66cbce3bda67a0b7db3b7e63ef97a2cf61f231a5beea7

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xxqgue.bin

              Filesize

              527B

              MD5

              49b1d10a8bee0b150f2662b0b0fd9de3

              SHA1

              e276a3601859997b41081f368c8aac69e7ee97b2

              SHA256

              ed87e32fb424996b03e4ca15b2ea08804e2098d2b8c534b1ff2b932bbe7184ee

              SHA512

              1ad7647287a8cdb62f760f7f154808966a7df689c98919caef1f5c6d03c0059cf50503d72987ee7acea3aea06c886ad2da133eba31e39048b882c98045a056a7

            • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

              Filesize

              44KB

              MD5

              9d352bc46709f0cb5ec974633a0c3c94

              SHA1

              1969771b2f022f9a86d77ac4d4d239becdf08d07

              SHA256

              2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

              SHA512

              13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

            • memory/232-137-0x0000000000FE0000-0x0000000000FE7000-memory.dmp

              Filesize

              28KB

            • memory/232-139-0x0000000000EC0000-0x0000000000EEF000-memory.dmp

              Filesize

              188KB

            • memory/1956-129-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/1956-136-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/3404-142-0x0000000008510000-0x0000000008684000-memory.dmp

              Filesize

              1.5MB