Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:22

General

  • Target

    formbook1.exe

  • Size

    433KB

  • MD5

    9672b2beca3027b6f008dfc291d21777

  • SHA1

    9dfa2b2cc3d1f04fd715068e9eee238d6b1ca5a7

  • SHA256

    ba10a45e13a79398a5802c91636684e54e53f26409feed99e7c89bbbe0c720d3

  • SHA512

    6396c39d4b9da16e541bb29659737d9841c5841c808c58a7d88accb35715d673820d63679ea0e0ff7642cd952158e11029b5fd689b0588cff8987816df3ccb2e

  • SSDEEP

    6144:6bE/HUrUAGxkcrTRkHqqZMWq1cD8YGMOsPEF75noWa4zbzDp/TkLNlkDfkDSDr0x:6bkxJkKqx4rB75HpALLkD0SMx

Malware Config

Extracted

Family

formbook

Campaign

nrln

Decoy

IG7zJSm49UqTTuu/N/oTCIg=

CVLdAPgw0CRSMuZnRRU=

PiA5Z3umP2NyX81VGQhjWyS59nFYhXiG

5i6p4GeQqtBgNRfGNQ==

5984keYswxh8mGZHz4ipAHtQ

VNJaK4Gh0CrOvHpW/p353A==

71rEtrL2icToyKGhcWrTxjsFU5T98zeO

r3q1sy1iZaL+2XIUAob7yw==

9+83Qkrk/vV/jVXsDvoTCIg=

aMFAgYF1prov8/UErH/Y1A==

Alqtx/0rxwEbCLdudftl

ImCbnglBSUHF0mv2tTSP40bPeYao

s4DFNvAJ4GIJ+g==

phOa6mtS8QQICuZnRRU=

7TSu5vqRtB45EZtf4WDSTBHPeYao

ImPWqwUUIVWMQLyMbUab7tmspvNCcT8=

HF7jKjbGox2SAffTPw==

yAM3mOQot5l+cD0ikR5MGp8=

UYzW0/8z70JcQenVLidu1kLPeYao

OoCznp5UWz+hT9OBFXbfVhXPeYao

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\formbook1.exe
      "C:\Users\Admin\AppData\Local\Temp\formbook1.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1852
      • C:\Users\Admin\AppData\Local\Temp\nbeggsncal.exe
        "C:\Users\Admin\AppData\Local\Temp\nbeggsncal.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2944
        • C:\Users\Admin\AppData\Local\Temp\nbeggsncal.exe
          "C:\Users\Admin\AppData\Local\Temp\nbeggsncal.exe"
          4⤵
          • Executes dropped EXE
          PID:2792
        • C:\Users\Admin\AppData\Local\Temp\nbeggsncal.exe
          "C:\Users\Admin\AppData\Local\Temp\nbeggsncal.exe"
          4⤵
          • Checks computer location settings
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2872
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\SysWOW64\netsh.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1360

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\cimrcc.g

      Filesize

      185KB

      MD5

      874dc59d7571e9ffa32c16740763a222

      SHA1

      cf2e6e6c8e7e3a2f4e1a348a289983a730b676fc

      SHA256

      da67c1628cfe982e5aa0995fd4c4f92a434e2e8a577941d7d9d0d8d1373a9183

      SHA512

      d4a8d8c5107cd029fd638f49efabee51d4a4167de260b998497f715fc80f205c03458bbf433c326b46b0fd647ba383df557015428b62457207bb335ce75cb41e

    • C:\Users\Admin\AppData\Local\Temp\nbeggsncal.exe

      Filesize

      131KB

      MD5

      669c2269eea6c11fd71038f0918193fb

      SHA1

      b2da793470b99bd215fbd9b3c7396ac402b068e9

      SHA256

      ba605ae9b548c05ffa985ddad9217cbdd99c1aecc83ce6e7cf36a162cb69938e

      SHA512

      0759ebe446901ab0974ff7cdac1b5517a7a739890a20858da93aaec94bd06bc4e6cb697b706864d78df044c41211990185b4bd9c00a24c616ce6004f371bc91c

    • C:\Users\Admin\AppData\Local\Temp\qzhglh.zo

      Filesize

      4KB

      MD5

      0bd04364eecd4445c14e6f6a52045245

      SHA1

      29cd354bba1a83d8e8342d2f7e13a90c87af59a4

      SHA256

      62cb82f57397ea5a5622f990d4729bc6838f5db0e17161080acf4fd46d0b751f

      SHA512

      efda83747836c79a852c0261c0843a3a55991c16fc16b6fd58e7cef3a3b0a4efe561c40b8701c9bb05b74792d273bbd75fd2818b7380a3aacb81a94729d7f6c7

    • C:\Users\Admin\AppData\Local\Temp\rhvh0.zip

      Filesize

      498KB

      MD5

      8517bf92c0fd6228875ba74b2526b3b4

      SHA1

      7aa157feed160f7e207ce961aaee21e3075b3ab9

      SHA256

      536ad85a299f5f7afc36f5944ea55d9f32495491265bf1305a41b3667176998d

      SHA512

      929c686123eb405c258d3ece2466b69f641041c2e2b7a4c13c7efa58a6654b387ac1ee4f7c643e70c84b38eddf39eccc6f816420e731e899468c9ab0fb9a2732

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      949KB

      MD5

      38a3e021eb32c9976adaf0b3372080fc

      SHA1

      68e02803c646be21007d90bec841c176b82211fd

      SHA256

      8cde0275d60da0d11954f73c7c8862cfc4b306f61bb8b1ce14abe4a193af2652

      SHA512

      b886cc112f2750e7300b66f7242850659fa49fdc97f75aed376cb9f5440875f303a143bf8b51068ec42674f1ebe1dfcc40534f3a7aed3cc4d20f9274b9a66d18

    • memory/1240-27-0x0000000006AF0000-0x0000000006C90000-memory.dmp

      Filesize

      1.6MB

    • memory/1240-35-0x0000000006980000-0x0000000006A5D000-memory.dmp

      Filesize

      884KB

    • memory/1240-33-0x0000000006980000-0x0000000006A5D000-memory.dmp

      Filesize

      884KB

    • memory/1240-20-0x0000000000010000-0x0000000000020000-memory.dmp

      Filesize

      64KB

    • memory/1240-21-0x0000000006AF0000-0x0000000006C90000-memory.dmp

      Filesize

      1.6MB

    • memory/1240-32-0x0000000006980000-0x0000000006A5D000-memory.dmp

      Filesize

      884KB

    • memory/2784-23-0x00000000017B0000-0x00000000017CB000-memory.dmp

      Filesize

      108KB

    • memory/2784-26-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/2784-25-0x00000000017B0000-0x00000000017CB000-memory.dmp

      Filesize

      108KB

    • memory/2784-81-0x0000000061E00000-0x0000000061ED7000-memory.dmp

      Filesize

      860KB

    • memory/2872-24-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/2872-19-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2872-18-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2872-17-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/2944-9-0x0000000000200000-0x0000000000202000-memory.dmp

      Filesize

      8KB