Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 14:48

General

  • Target

    MAERSK Tracking Document.scr

  • Size

    924KB

  • MD5

    3a8f82508c711f924c54faa42d31a59a

  • SHA1

    b97dc139f2d5027e74f03b1ef9e0949a83d62c54

  • SHA256

    54bd1e36470a85b388bf211308b661eb8f6cf52300ed006a8adaa3d9d087cf9d

  • SHA512

    288aa5b52e6082c383385003b806bf75d9ef17990b3fc6acb5cac5e20710b4a0125729d556a907336269c778fc5bd283c2b2d606230f4729f1515be2d5e69545

  • SSDEEP

    12288:AiB4sLf+BvqbT+ZJjHKqrKdLazzSYCUZRFRrKdFP55FW/Bw8ytA7RATi+esTCmf:AiB4PlFJWqQLkJezjyBjytA7S2mf

Malware Config

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3420
    • C:\Users\Admin\AppData\Local\Temp\MAERSK Tracking Document.scr
      "C:\Users\Admin\AppData\Local\Temp\MAERSK Tracking Document.scr" /S
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:1760
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\MAERSK Tracking Document.scr"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1148-27-0x0000000000F20000-0x0000000000F77000-memory.dmp

    Filesize

    348KB

  • memory/1148-29-0x0000000000F20000-0x0000000000F77000-memory.dmp

    Filesize

    348KB

  • memory/1760-14-0x00000000026D0000-0x00000000026D1000-memory.dmp

    Filesize

    4KB

  • memory/1760-25-0x00000000047F0000-0x0000000004804000-memory.dmp

    Filesize

    80KB

  • memory/1760-10-0x0000000002570000-0x0000000002571000-memory.dmp

    Filesize

    4KB

  • memory/1760-9-0x0000000002400000-0x0000000002401000-memory.dmp

    Filesize

    4KB

  • memory/1760-8-0x00000000023F0000-0x00000000023F1000-memory.dmp

    Filesize

    4KB

  • memory/1760-7-0x0000000002430000-0x0000000002431000-memory.dmp

    Filesize

    4KB

  • memory/1760-6-0x0000000002420000-0x0000000002422000-memory.dmp

    Filesize

    8KB

  • memory/1760-5-0x00000000023E0000-0x00000000023E1000-memory.dmp

    Filesize

    4KB

  • memory/1760-4-0x00000000005C0000-0x00000000005C1000-memory.dmp

    Filesize

    4KB

  • memory/1760-3-0x00000000005D0000-0x00000000005D1000-memory.dmp

    Filesize

    4KB

  • memory/1760-13-0x0000000002410000-0x0000000002411000-memory.dmp

    Filesize

    4KB

  • memory/1760-2-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

  • memory/1760-0-0x0000000000400000-0x000000000053C000-memory.dmp

    Filesize

    1.2MB

  • memory/1760-15-0x0000000000400000-0x000000000053C000-memory.dmp

    Filesize

    1.2MB

  • memory/1760-24-0x00000000043E0000-0x00000000044E0000-memory.dmp

    Filesize

    1024KB

  • memory/1760-18-0x00000000026D0000-0x00000000026D1000-memory.dmp

    Filesize

    4KB

  • memory/1760-19-0x0000000000400000-0x000000000053C000-memory.dmp

    Filesize

    1.2MB

  • memory/1760-22-0x0000000004840000-0x0000000004B8A000-memory.dmp

    Filesize

    3.3MB

  • memory/1760-16-0x00000000022E0000-0x0000000002322000-memory.dmp

    Filesize

    264KB

  • memory/1760-11-0x0000000002560000-0x0000000002561000-memory.dmp

    Filesize

    4KB

  • memory/1760-1-0x00000000022E0000-0x0000000002322000-memory.dmp

    Filesize

    264KB

  • memory/1760-12-0x0000000002550000-0x0000000002551000-memory.dmp

    Filesize

    4KB

  • memory/1760-30-0x0000000000400000-0x000000000053C000-memory.dmp

    Filesize

    1.2MB

  • memory/3420-26-0x0000000003140000-0x00000000032C4000-memory.dmp

    Filesize

    1.5MB

  • memory/3420-31-0x0000000003140000-0x00000000032C4000-memory.dmp

    Filesize

    1.5MB

  • memory/3420-35-0x0000000003380000-0x0000000003440000-memory.dmp

    Filesize

    768KB

  • memory/3420-37-0x0000000003380000-0x0000000003440000-memory.dmp

    Filesize

    768KB

  • memory/3420-38-0x0000000003380000-0x0000000003440000-memory.dmp

    Filesize

    768KB