Analysis

  • max time kernel
    150s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2024 13:41

General

  • Target

    6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe

  • Size

    1.0MB

  • MD5

    5097fe796d4bca99a3d79998c27116cd

  • SHA1

    2e78d6968f547a5d70e5795ce89cbd51a06a90fa

  • SHA256

    6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f

  • SHA512

    d5c8c470c6496e4bc0fc1781f59cbd19f7a96d8cc98d3a5a5956123761bac1f7a635db3b908050652cb42a7ee2f0cd924cb5809239291d5ac3b5c2d723389180

  • SSDEEP

    24576:hN/BUBb+tYjBFHNhz6FI9Dh7WinTX1zJ54D+q0lPBzkFy:jpUlRhPzna4X1zJ5w+JPBAy

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

o52o

Decoy

ckroom.xyz

apanstock.online

6dtd8.vip

phone-in-installment-kz.today

ichaellee.info

mpresamkt38.online

ivein.today

78cx465vo.autos

avannahholcomb.shop

eochen008.top

rcraft.net

eth-saaae.buzz

ifxz.info

flegendarycap50.online

reon-network.xyz

ee.zone

ameralife.net

5en4.shop

eal-delivery-34026.bond

anion.app

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 5 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious behavior: MapViewOfSection 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Users\Admin\AppData\Local\Temp\6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe
      "C:\Users\Admin\AppData\Local\Temp\6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rwwk.vbe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1940
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ipconfig /release
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2268
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /release
            5⤵
            • System Location Discovery: System Language Discovery
            • Gathers network information
            PID:2280
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c gbkusncub.ppt hcmdvu.msc
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2360
          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\gbkusncub.ppt
            gbkusncub.ppt hcmdvu.msc
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2648
            • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
              "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:948
            • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
              "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:1532
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ipconfig /renew
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2916
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /renew
            5⤵
            • System Location Discovery: System Language Discovery
            • Gathers network information
            PID:1300
    • C:\Windows\SysWOW64\autoconv.exe
      "C:\Windows\SysWOW64\autoconv.exe"
      2⤵
        PID:1544
      • C:\Windows\SysWOW64\wlanext.exe
        "C:\Windows\SysWOW64\wlanext.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1900
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\SysWOW64\explorer.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2332
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1908

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\chkblaxft.docx

      Filesize

      522B

      MD5

      e51ef2d4160c0f41b42ea8f38dedaa45

      SHA1

      aca488c15e88ad25e089eb374b6c1ead4c800e68

      SHA256

      4b7eabb2302fec9292a5aeb5949d54c0744c57de6cc527fb285441d29fae3c24

      SHA512

      4bf85824b9f0447e175fef3a731a514df19470b45611df683d6aafb5844d1dd23512ef092480ff715978c4e27df129cea355493fa56d2407a24dc3b993b403e0

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cucii.ppt

      Filesize

      562B

      MD5

      0a597abaa9895b8a6e2a1e01c1d2e207

      SHA1

      f37d888d098be4d11e5c170fb8e1e7470d91290c

      SHA256

      9d7b071af5a275c98a994d56ee211e646c8aa2cba39fb37fa20d78f73179552f

      SHA512

      9686f6182a3946c9013ea0b0147cc0ead5ecbe529645e6e70faf5779acb72f48849e9cae7c2519fd497a169d9b7a7f2acef990a85401727c42ce4a6994703b2b

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dddrmcvn.das

      Filesize

      511B

      MD5

      685b8082e059988e8f569a7c957d67cc

      SHA1

      6402355c5a4a7514a39fee6ee37c46902a4efc24

      SHA256

      2b14a53107fec583b8ecb5055d194a2c5997491cb91a7cddf989dfd787fd577d

      SHA512

      5692ac0f30dac8f18c0c0d52578cda99ce2f3c9656b5b2c6437dda4e5c6c014e8f94f5584785c50847346be963b737e3fce0c727884955c01c9129eff2154a44

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ebxc.exe

      Filesize

      570B

      MD5

      bb96fa2eb279e1fa70ee33b80ddf5486

      SHA1

      d4eca17fd2b78bfb8264295e6f254255649ca3af

      SHA256

      bb828b95aa2bef4d424ae1ecc976435ad053b06ec5e89af75de2763b0cce523c

      SHA512

      bd81985876a5cf9d4c579a2f0ea7738b28df12c1f2a9c4c1a8c12ace89b1a32bdf098987b807435f2cc950695015b7069b61360f55d9e3ba711359609a7e7b04

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\edfpst.jpg

      Filesize

      543B

      MD5

      f7490a6265f334876342496600dfca5c

      SHA1

      e79e42617ba61c13293b3ad44d2fdcb547fd75f3

      SHA256

      b61b5dbc2284545df43d06b8434819b95bcc6ae4e5e22617f05a97e5ac2fef17

      SHA512

      b2ee0fd841a658df4ccb2db1d63a31aeebf47baa4a3ff6d8fd956ad76531e131b61a637b2ba49e1d161b6950c06e838b61bc19bf840832c68cc559649acc9c06

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fkawpxd.ppt

      Filesize

      514B

      MD5

      3d8dd208a1bc990063b574044319ff30

      SHA1

      8a028e38eecaaa27c448ec281bfc1a00045895b5

      SHA256

      84d1770a96d4802e652390702f6022d144238548a7f0f6a80497975165cfe2c3

      SHA512

      62e46b51fe8569d5c24a96f398ab826457f5ed2a98fa7af27e012bbad7a83c6d6a0d31338192d0276617c2c99314bb71ab13d995db4118ba54c5909b706467cf

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fuvdg.msc

      Filesize

      529B

      MD5

      2ddf35f6efa65e7b1e286e3839980288

      SHA1

      dcbcfd1ed8d5a63e07b89bdf65ec39af1373c4f8

      SHA256

      8da7643f1455aed90195609e344014ada2f338c6f7e59c68faef3a7714f84b3b

      SHA512

      980bb720a6326d2f60e7e3e70ef65b3131b1166383cbc42b57d5474d03f884ab271da8847f2679d640931813cf27c88800b9a1f780a6f6912e9cd98dc948e887

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\gkgmtswhmc.jpg

      Filesize

      513B

      MD5

      45d2330198499ebfd1b73e984826fe5e

      SHA1

      6178824c68fb54d2e79aa6914b517530628b8220

      SHA256

      7407261ce6f3f09ffb85b70a630d7d951e2bd88f709b7f504f2dbef21bd3dd6c

      SHA512

      86056988f1eee5339620c8906aaa4914718d3b8ceb6c69ae65401358dfab1ff66cda12de286770fe675104358d31b200a4d60b24f8c224ada2ac0a4640fb359f

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\havvtivnup.bmp

      Filesize

      540B

      MD5

      5a33acb108a1c219ed1194d8381cd40a

      SHA1

      d55846b97a021bbe4dcf490085a0824ad2c38961

      SHA256

      f26513a135fa2e295c130a54290838e954b668d5aa013887f12b09ca0a735e93

      SHA512

      a18fd243b2463ff6ea3cb61c7347cfa3c66f757647e9185a8a65114de11def9bd0ca40d8bc08da3ed0f45f913b948a7e377367d1d93739beb2d593e5496229c5

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ijqn.mgf

      Filesize

      351KB

      MD5

      fae6ee35c0f5ac2dc4885c0de8e88032

      SHA1

      587bf6f4105d4420762c463ba33e9e3ba677e85f

      SHA256

      4db090b6f1cd2501c929b31c2e29d4d0a4ddf1e81be6800e763d8c45bea8744d

      SHA512

      1ce62d900017dd4545023acc3ca32daee7eb454a6144c99958d57e88838402013854f410b8be1fb5d607819c48ba72fefecc11d2c78a81408855bf3899e04b38

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\jqgrvgmurv.docx

      Filesize

      581B

      MD5

      16fa357e6e8840d33742a7717112abd8

      SHA1

      866906ce593fbc4b7a27f7c4d6ed172a225b0d50

      SHA256

      6b5ea4f4f6718ff1f3ec6b8c7f6518f447de4cea2ab2dac8a5371202487b7939

      SHA512

      a4d39e318aabee034e1225ed91c7ea06f1cd93b013cde0ef34bd6e3b2ce4719615efe7f9da98611d872d6fdf7062c4d13079776b27c75bb407332bc0cf443c5d

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ojmspoptet.mp3

      Filesize

      512B

      MD5

      470edbbda73def0f717d602dd7f78c56

      SHA1

      7aaa4969c33a33a770534cbabbeb8bb100106a7f

      SHA256

      bdb2567db5e89eeb431c2c4dfac73673e50b512258684cc67d9ccea0b2665b64

      SHA512

      47a1c4a233d6f52a7f756d17861552fda764b8d20cdbf61155f9445905ae7885050e39788b991692452ad71a76abb3765a7d20e5edd9838c6f77478c60550ce9

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwmk.xls

      Filesize

      637B

      MD5

      81feb95c89263dc75504bff8e06a5d90

      SHA1

      10454bc7f50a03508fa973874fbdcf433bd2d2f6

      SHA256

      85609bb1d624bcbc6db2a4db193e871d08c3c22f826f214dd34cb0cb3255b479

      SHA512

      029325eba2ddf3fc3c263a4719df6963433bab9bf4e568ee007662b62289ee69cf4e28566975679230d95e67f7697a28e4a300fdb27844c22fb810506b3306cf

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rwwk.vbe

      Filesize

      62KB

      MD5

      465381aa4e9b430423f61894f1ca3b7a

      SHA1

      cb87f2e9902cd6fd1559afaffbf93d427e2db11c

      SHA256

      2bd6653b99fc6535c1fcae63c1091f6bc227e20a72b0501f46eebee5e073677a

      SHA512

      8f38351940dbe639c447b06cd3004d421669d3f880c2e6c0db421a2774cc92a91d6aa66e58a27e688b49d6b6881eb4134ac20a707891630516da5ab7406666e0

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\sltfiwsc.dll

      Filesize

      42KB

      MD5

      9c3405160c29af9d745c01e85258d216

      SHA1

      28fc240be5dab0d20e11513c838039b1edfd8eae

      SHA256

      a197e7a9fe3a95b01be43406fa6b497d3e5a650af15665bcbeb1d47b5566b81d

      SHA512

      2c41e654c916ac53381742a29cdbd8ab00134f51d18799397ab86709eb89247b911f269dba871860f39f0b874e50773bd11fd085171ec2155a02e73e41e221e4

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\sltfiwsc.dll

      Filesize

      42KB

      MD5

      22f822322ddddb7e3169080058b05ae6

      SHA1

      125f3af3d92bf7852ad9936449c0f66d8ddc9b2a

      SHA256

      b5ae6a489465ef6111a05c70e4c455825da1aefa4da28672ab14708fc862c8e5

      SHA512

      9339143cde357a11eb17b2ea358a4f7c20d8ba1c013130cf5b135e5f31152e73216b3145a8d95bbdab463ccdde905b9156edce9f67efda6b0ae8161d3ea51946

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\tjif.icm

      Filesize

      528B

      MD5

      6f6df56c43cc6f1c193aad1c7ab82d06

      SHA1

      854f0199c9223417a3b6f82ada40afae98d144b6

      SHA256

      1ac36434bcaf1b5092e4c4ad1038cca646817fe26c12d9efea0d1ee708f5e7b6

      SHA512

      0ed1a079782d22bd1f4f5ef8c990cb1cdfb35042acb3e636e539468ea81d9c76ce9d8fbd9250e490b80808a19cffc151832279d630529a370aeb97452be9cf23

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xuncqfg.bin

      Filesize

      543B

      MD5

      f0e4edf30f267fbc4c721e275845377a

      SHA1

      04ecffcbfbaea9c4e75f005e19cfee8146c6bb34

      SHA256

      7d06a00c8471f7e712c435ef1ccbe2e9d84550db3cdc9849d33fd8fb9e49985b

      SHA512

      d90197c3f3a5fd8237cc5db49106763af311f4084b71a12e4755152e2fc740cfb1c1b9f3ae468bef489c3c1cdc776f576f98cbe82e740040fe09262aa9bde253

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xxmcsujdoo.das

      Filesize

      509B

      MD5

      1f26c199cc3920e832244b417095e92d

      SHA1

      0377748fa2da7c3d521b800f6f84b76f8f975418

      SHA256

      80489b9caf4a3e00356ae69a3d94ca7b5afb54e162e4cd2b2ab5f57dd91ea1ed

      SHA512

      dddd31c3d68cdafeb3fc5eeb54fcb8d5221db34c7afec1374c727f900971807a2e064828611f75ac58a66cbce3bda67a0b7db3b7e63ef97a2cf61f231a5beea7

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xxqgue.bin

      Filesize

      527B

      MD5

      49b1d10a8bee0b150f2662b0b0fd9de3

      SHA1

      e276a3601859997b41081f368c8aac69e7ee97b2

      SHA256

      ed87e32fb424996b03e4ca15b2ea08804e2098d2b8c534b1ff2b932bbe7184ee

      SHA512

      1ad7647287a8cdb62f760f7f154808966a7df689c98919caef1f5c6d03c0059cf50503d72987ee7acea3aea06c886ad2da133eba31e39048b882c98045a056a7

    • \Users\Admin\AppData\Local\Temp\RarSFX0\gbkusncub.ppt

      Filesize

      925KB

      MD5

      0adb9b817f1df7807576c2d7068dd931

      SHA1

      4a1b94a9a5113106f40cd8ea724703734d15f118

      SHA256

      98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b

      SHA512

      883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a

    • \Users\Admin\AppData\Local\Temp\RegSvcs.exe

      Filesize

      44KB

      MD5

      0e06054beb13192588e745ee63a84173

      SHA1

      30b7d4d1277bafd04a83779fd566a1f834a8d113

      SHA256

      c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768

      SHA512

      251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215

    • memory/948-138-0x0000000000400000-0x00000000008F9000-memory.dmp

      Filesize

      5.0MB

    • memory/948-140-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/948-141-0x0000000000400000-0x00000000008F9000-memory.dmp

      Filesize

      5.0MB

    • memory/948-149-0x0000000000400000-0x00000000008F9000-memory.dmp

      Filesize

      5.0MB

    • memory/1172-158-0x0000000007910000-0x0000000007A1C000-memory.dmp

      Filesize

      1.0MB

    • memory/1532-131-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1532-136-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1532-135-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1532-133-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1532-148-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1900-151-0x00000000009B0000-0x00000000009C6000-memory.dmp

      Filesize

      88KB

    • memory/2332-150-0x0000000000460000-0x00000000006E1000-memory.dmp

      Filesize

      2.5MB

    • memory/2332-155-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB