Resubmissions

18-11-2024 02:48

241118-dalvvs1pej 10

18-11-2024 02:42

241118-c7cg1swkgz 10

Analysis

  • max time kernel
    1049s
  • max time network
    1049s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    18-11-2024 02:48

General

  • Target

    NewPurchaseOrder.exe

  • Size

    1.1MB

  • MD5

    fd81b225513545b27b6a852e7e5cc8f6

  • SHA1

    28868ac1e40f4c30cd7d67a283aa94a7c5b456ff

  • SHA256

    a6383c0e6d1660f45356eb6b6cfcb90d7558682c94994b7f23c02764a7d4fc08

  • SHA512

    1237b153bf6d76ddec52b7bbcdaadfafc9fe10127c5ec5dd7f00485fd5bf63d7adee8e1c86c2fc388cfa1547c29e040e704be381064f586a2383da6923450ac2

  • SSDEEP

    24576:vtb20pkaCqT5TBWgNQ7aLBF8famrZxNLj6A:sVg5tQ7aLBGPNvX5

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ge07

Decoy

amyard.shop

eloshost.xyz

g18q11a.top

orensic-vendor-735524320.click

ithin-ksvodn.xyz

xhyx.top

elonix-traceglow.pro

cillascrewedsedroth.cfd

wner-nyquh.xyz

reyhazeusa.shop

esmellretaperetotal.cfd

hqm-during.xyz

pipagtxcorrelo.xyz

lray-civil.xyz

apybarameme.xyz

rbuds.shop

hild-fcudh.xyz

rkgexg.top

estwestcottwines.shop

giyztm.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3580
    • C:\Users\Admin\AppData\Local\Temp\NewPurchaseOrder.exe
      "C:\Users\Admin\AppData\Local\Temp\NewPurchaseOrder.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\NewPurchaseOrder.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1416
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4640
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\svchost.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3276
      • C:\Windows\SysWOW64\cmd.exe
        /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
        3⤵
        • System Location Discovery: System Language Discovery
        PID:652
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:4588
      • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\Desktop\PingTrace.ppt" /ou ""
        2⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:1472
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:700
      • C:\Windows\system32\dashost.exe
        dashost.exe {0e83705b-8c1e-47f2-867e55a1d1745f21}
        2⤵
          PID:3588

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\L-N72-6R\L-Nlogim.jpeg

        Filesize

        87KB

        MD5

        27d28efe5772298a248c6e693e9d7c1f

        SHA1

        91e499e660e4beabe025d903770f34d8d0b8caae

        SHA256

        08d534adc7985380458ba9a82667cdab0df40d2e85c77993707b5c1878243eb3

        SHA512

        e352f5afcc0a4dd13a53fcfde26c53a18f6144f88ac1d08c5ae13212eccce19491f5e72c13ab3c426aa4edb79669d857dd7e2705df47553518c47381d77dec51

      • C:\Users\Admin\AppData\Roaming\L-N72-6R\L-Nlogrf.ini

        Filesize

        40B

        MD5

        2f245469795b865bdd1b956c23d7893d

        SHA1

        6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

        SHA256

        1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

        SHA512

        909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

      • C:\Users\Admin\AppData\Roaming\L-N72-6R\L-Nlogrg.ini

        Filesize

        38B

        MD5

        4aadf49fed30e4c9b3fe4a3dd6445ebe

        SHA1

        1e332822167c6f351b99615eada2c30a538ff037

        SHA256

        75034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56

        SHA512

        eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945

      • C:\Users\Admin\AppData\Roaming\L-N72-6R\L-Nlogri.ini

        Filesize

        40B

        MD5

        d63a82e5d81e02e399090af26db0b9cb

        SHA1

        91d0014c8f54743bba141fd60c9d963f869d76c9

        SHA256

        eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

        SHA512

        38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

      • C:\Users\Admin\AppData\Roaming\L-N72-6R\L-Nlogrv.ini

        Filesize

        872B

        MD5

        bbc41c78bae6c71e63cb544a6a284d94

        SHA1

        33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a

        SHA256

        ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb

        SHA512

        0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1b4dd67f29cb1962.automaticDestinations-ms

        Filesize

        1KB

        MD5

        5b945a23f1f2fabe7a82e133c9d626c1

        SHA1

        48a16cd2e10e60ea8b85c6b4444f6aec14c147c5

        SHA256

        7b411376babfd9af035b73a247da2edd8deb8ee3f1824af158f1ffa8cd9497be

        SHA512

        156902587ed6df1f578296a39326ba9fcb078a54eeeb831ebba16fa3c23b25a05d99370beec51d346dcf30f770b51e17c6fc8a007e8e7d4da106e307d7d7d19d

      • memory/1416-7-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1416-8-0x0000000001700000-0x0000000001A4C000-memory.dmp

        Filesize

        3.3MB

      • memory/1416-11-0x0000000001B50000-0x0000000001B65000-memory.dmp

        Filesize

        84KB

      • memory/1416-10-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1472-43-0x00007FF8DD110000-0x00007FF8DD308000-memory.dmp

        Filesize

        2.0MB

      • memory/1472-48-0x00007FF8DD110000-0x00007FF8DD308000-memory.dmp

        Filesize

        2.0MB

      • memory/1472-79-0x00007FF8DD110000-0x00007FF8DD308000-memory.dmp

        Filesize

        2.0MB

      • memory/1472-78-0x00007FF89D190000-0x00007FF89D1A0000-memory.dmp

        Filesize

        64KB

      • memory/1472-75-0x00007FF89D190000-0x00007FF89D1A0000-memory.dmp

        Filesize

        64KB

      • memory/1472-76-0x00007FF89D190000-0x00007FF89D1A0000-memory.dmp

        Filesize

        64KB

      • memory/1472-28-0x00007FF89D190000-0x00007FF89D1A0000-memory.dmp

        Filesize

        64KB

      • memory/1472-31-0x00007FF8DD1AD000-0x00007FF8DD1AE000-memory.dmp

        Filesize

        4KB

      • memory/1472-29-0x00007FF89D190000-0x00007FF89D1A0000-memory.dmp

        Filesize

        64KB

      • memory/1472-30-0x00007FF89D190000-0x00007FF89D1A0000-memory.dmp

        Filesize

        64KB

      • memory/1472-33-0x00007FF89D190000-0x00007FF89D1A0000-memory.dmp

        Filesize

        64KB

      • memory/1472-36-0x00007FF8DD110000-0x00007FF8DD308000-memory.dmp

        Filesize

        2.0MB

      • memory/1472-37-0x00007FF8DD110000-0x00007FF8DD308000-memory.dmp

        Filesize

        2.0MB

      • memory/1472-35-0x00007FF89D190000-0x00007FF89D1A0000-memory.dmp

        Filesize

        64KB

      • memory/1472-39-0x00007FF8DD110000-0x00007FF8DD308000-memory.dmp

        Filesize

        2.0MB

      • memory/1472-40-0x00007FF8DD110000-0x00007FF8DD308000-memory.dmp

        Filesize

        2.0MB

      • memory/1472-41-0x00007FF89AF40000-0x00007FF89AF50000-memory.dmp

        Filesize

        64KB

      • memory/1472-38-0x00007FF8DD110000-0x00007FF8DD308000-memory.dmp

        Filesize

        2.0MB

      • memory/1472-44-0x00007FF8DD110000-0x00007FF8DD308000-memory.dmp

        Filesize

        2.0MB

      • memory/1472-45-0x00007FF8DD110000-0x00007FF8DD308000-memory.dmp

        Filesize

        2.0MB

      • memory/1472-47-0x00007FF8DD110000-0x00007FF8DD308000-memory.dmp

        Filesize

        2.0MB

      • memory/1472-77-0x00007FF89D190000-0x00007FF89D1A0000-memory.dmp

        Filesize

        64KB

      • memory/1472-49-0x00007FF89AF40000-0x00007FF89AF50000-memory.dmp

        Filesize

        64KB

      • memory/1472-46-0x00007FF8DD110000-0x00007FF8DD308000-memory.dmp

        Filesize

        2.0MB

      • memory/1472-51-0x00007FF8DD110000-0x00007FF8DD308000-memory.dmp

        Filesize

        2.0MB

      • memory/1472-50-0x00007FF8DD110000-0x00007FF8DD308000-memory.dmp

        Filesize

        2.0MB

      • memory/1472-70-0x00007FF8DD110000-0x00007FF8DD308000-memory.dmp

        Filesize

        2.0MB

      • memory/1472-52-0x00007FF8DD110000-0x00007FF8DD308000-memory.dmp

        Filesize

        2.0MB

      • memory/2916-6-0x0000000001600000-0x0000000001A00000-memory.dmp

        Filesize

        4.0MB

      • memory/3580-21-0x0000000008A40000-0x0000000008B16000-memory.dmp

        Filesize

        856KB

      • memory/3580-25-0x0000000009790000-0x00000000098C2000-memory.dmp

        Filesize

        1.2MB

      • memory/3580-24-0x0000000009790000-0x00000000098C2000-memory.dmp

        Filesize

        1.2MB

      • memory/3580-61-0x0000000009790000-0x00000000098C2000-memory.dmp

        Filesize

        1.2MB

      • memory/3580-12-0x0000000008A40000-0x0000000008B16000-memory.dmp

        Filesize

        856KB

      • memory/4640-20-0x0000000000E50000-0x0000000000E7F000-memory.dmp

        Filesize

        188KB

      • memory/4640-23-0x0000000002BA0000-0x0000000002C34000-memory.dmp

        Filesize

        592KB

      • memory/4640-19-0x0000000002D60000-0x00000000030AC000-memory.dmp

        Filesize

        3.3MB

      • memory/4640-18-0x0000000000E50000-0x0000000000E7F000-memory.dmp

        Filesize

        188KB

      • memory/4640-17-0x0000000000190000-0x00000000001A2000-memory.dmp

        Filesize

        72KB

      • memory/4640-15-0x0000000000190000-0x00000000001A2000-memory.dmp

        Filesize

        72KB

      • memory/4640-13-0x0000000000190000-0x00000000001A2000-memory.dmp

        Filesize

        72KB