Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:03

General

  • Target

    6d2540eeff1a42dc52bb8eae9b15b4486f6a345ac282e601509f9d98896ee769.exe

  • Size

    188KB

  • MD5

    d2d23492e37c959820e2fbbbe8d6a4c0

  • SHA1

    58c3d0da65b2f746c5465dc17d3f710a583e8dc3

  • SHA256

    6d2540eeff1a42dc52bb8eae9b15b4486f6a345ac282e601509f9d98896ee769

  • SHA512

    61fc1fe8055da484aa0780f123acd11ec61927ba6c5670cff9ec23a074894d8e58ea03930f0d85d4a60882f24304fa455740dc5e4795092323f6785130aa47cd

  • SSDEEP

    3072:fp3qJHjpMt7WY5u9Qn77za5efqv20OQ6B55ESbRusSDt/M/MvVWcl9EGeK:fp6JDIih47K5i0h6B5KSbMMMvVWcXEG

Malware Config

Extracted

Family

formbook

Campaign

ncpr

Decoy

bVBX5DcJzr9yf94C3w==

pAza9ePFpFp759M=

GeHCdpsX/21yf94C3w==

A86m2jOAb2lCta5KjFGSBLa0Bdru/eQt

bEERX4lbMxXbYU3pYqPIU32+

XLFilcOTXqV04j9CxpgWTXS2

UQTWj58OqzP2ew==

MqVmrtvUwL+EuyI6FfY+xgYaxA==

Fe3ugYgE7GZT3UohKWCrog==

YsWZa7gt9HJXwDhOrwIWTXS2

9mk4g8/Nnlp759M=

g01M0Tsk/vVnrhpC5zZrpw==

ec6PYogewB7aZw==

JveT+/6JbtwGUcTPwA==

EO3y7N6/n5uK0eyQ+bdcU7x9zA==

SRMfKoboyEnEDYOUZWns8TU=

kW15b1o+IOtNpgst5zZrpw==

gUo40RWBHijfIAiuuMdrKA+WMdA=

HvDy2QVdG2cjuiJC7WrE6i4=

uwOMiN8j6q9/966Mltg=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d2540eeff1a42dc52bb8eae9b15b4486f6a345ac282e601509f9d98896ee769.exe
    "C:\Users\Admin\AppData\Local\Temp\6d2540eeff1a42dc52bb8eae9b15b4486f6a345ac282e601509f9d98896ee769.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:3824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3824-0-0x0000000000981000-0x00000000009AF000-memory.dmp

    Filesize

    184KB

  • memory/3824-1-0x0000000000980000-0x00000000009AF000-memory.dmp

    Filesize

    188KB

  • memory/3824-2-0x0000000000981000-0x00000000009AF000-memory.dmp

    Filesize

    184KB