Analysis

  • max time kernel
    147s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:05

General

  • Target

    Fattura_855.pdf.exe

  • Size

    240KB

  • MD5

    068b6fd352736535c7d967673914c66a

  • SHA1

    ae5b7ac0e73123f5b2b31e9a3b1061c9985e70bf

  • SHA256

    df52a26061f50bed16f94038cfedb42e1b492b9ce865daabd7ce15db4db9b8a3

  • SHA512

    0b3eff80a6cba89895c554206bb64246bc090a04015eae579e9624f71a72e750fa0d9c352f1922731698223444b1b583c3aa075fc67fb00c32f6fe19b8bb585f

  • SSDEEP

    6144:HNeZm//7la+u61CkduDVUWurQZt1czVpwS:HNl/zlnNCyAUW1KgS

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

m0r9

Decoy

neekoluldao.com

pandolam.com

homestore.website

inthemoart.com

plubmingcny.com

tsandjsdjproductions.com

bangkok-bars.com

theroganexperience.com

cisneros.media

cxaerfa.xyz

dalafea.online

eppsallen.com

kksm1.com

navega.site

coloradonews.info

rnhues3j.xyz

languageslibrary.com

metapharmacyphuket.net

invisiblelady.com

suculentaycactaceo3d.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Users\Admin\AppData\Local\Temp\Fattura_855.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\Fattura_855.pdf.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Users\Admin\AppData\Local\Temp\gocbcx.exe
        C:\Users\Admin\AppData\Local\Temp\gocbcx.exe C:\Users\Admin\AppData\Local\Temp\rnukeqm
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2084
        • C:\Users\Admin\AppData\Local\Temp\gocbcx.exe
          C:\Users\Admin\AppData\Local\Temp\gocbcx.exe C:\Users\Admin\AppData\Local\Temp\rnukeqm
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2536
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:1972
      • C:\Windows\SysWOW64\help.exe
        "C:\Windows\SysWOW64\help.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2296
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\gocbcx.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2980

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\gocbcx.exe

      Filesize

      64KB

      MD5

      6c310e309e2ddfe8ae53e95c525c9e52

      SHA1

      694861bf8fbddafc5673853c8f7c910a2b60a1b7

      SHA256

      ffef20b2c9b8d9cdd4f471718ef688a8bd4834b6481978574b877ab14a91228d

      SHA512

      8030a4b7d8d225699d4c9d71cf015dbb90895266e9006c5fee1ba9ce56ac871f1f9477ee4ccf6c62109ef23f0321d9590a3b286156d5b57e30bbe2f9d302a931

    • C:\Users\Admin\AppData\Local\Temp\ncssrlmzyd

      Filesize

      184KB

      MD5

      02475297a79138c050381b19f13cbb88

      SHA1

      efeb9032605484fdea6478b224afe59af46f29a3

      SHA256

      a3439fba9220dbfe1fb05f3dfa24aab3e7f72071ff1f16bae20fd58c227e4b7a

      SHA512

      35e9e844e33c1ac1ad3ce9e035ba2ff6302e84941bcd300011c758fa6eb917292a2db480a3d1592e6a275b84621708b08109579599781c2fd28fdba8f7e25d55

    • C:\Users\Admin\AppData\Local\Temp\rnukeqm

      Filesize

      5KB

      MD5

      8d73805cc88e7c5fb975ea51d44509c0

      SHA1

      7b3615aeb8d8a6a049dd59d2c6883c2d60c689b8

      SHA256

      83bd692b6115ceeb84745dac471dc333377ce29178894d0493e0d2a6acd975b4

      SHA512

      e50598247e565bb3d509189c107f288ee07d163913d38a2e9ebf2f5bdaed969c49c027c96e0afab8a00cefc2c4cf4e712d99b853a2b3af36694ff1784b75dff3

    • memory/1148-19-0x0000000004470000-0x0000000004571000-memory.dmp

      Filesize

      1.0MB

    • memory/1148-22-0x0000000004470000-0x0000000004571000-memory.dmp

      Filesize

      1.0MB

    • memory/1148-23-0x00000000051A0000-0x000000000527E000-memory.dmp

      Filesize

      888KB

    • memory/1148-29-0x00000000051A0000-0x000000000527E000-memory.dmp

      Filesize

      888KB

    • memory/2084-11-0x0000000000220000-0x0000000000222000-memory.dmp

      Filesize

      8KB

    • memory/2296-27-0x0000000000BA0000-0x0000000000BA6000-memory.dmp

      Filesize

      24KB

    • memory/2296-26-0x0000000000BA0000-0x0000000000BA6000-memory.dmp

      Filesize

      24KB

    • memory/2296-28-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/2536-15-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2536-18-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2536-21-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB