Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2024 02:21

General

  • Target

    b7c048465cfc09a8649043c0571a84d1edff4a8509e80dc55470fbbc83f0c618.exe

  • Size

    550KB

  • MD5

    304ae39e62244a946e1cef21393fe3b7

  • SHA1

    6157b6191e3df5d1a01776cadd0e3988e7597bc8

  • SHA256

    b7c048465cfc09a8649043c0571a84d1edff4a8509e80dc55470fbbc83f0c618

  • SHA512

    8d765cc52575334ecf36256eb8ce0c6a2061b43b0d959888542111859b864cbe4227fdbb567a5db881fc97b1e19999e0c57b3b4cd875eea9264ea4715a2234ed

  • SSDEEP

    12288:5MUgm/3dE/fGiCNGiTVTsdrE0V92fO/lk9onzNXxn2ive:5M2//iCRSdrZV92f79onzNXEive

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

giok

Decoy

royaltysplit.xyz

home-remodeling-32327.bond

ocosoap.download

mx51pbk5z3.top

sapidermen154.buzz

always23082025.info

jencodiahcp.net

psychologist-therapy-13104.bond

okigoods.online

posedon.online

ryclegalpartners.info

seek-zapatosenlinea-cl.info

xataa.info

vitalityyvault.online

hallice732.xyz

snspleak.info

ilbrentdigitalx.info

breast-implants-17988.bond

subedisaurav.site

instamoney.website

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 4 IoCs
  • Adds policy Run key to start application 2 TTPs 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: MapViewOfSection 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\b7c048465cfc09a8649043c0571a84d1edff4a8509e80dc55470fbbc83f0c618.exe
        "C:\Users\Admin\AppData\Local\Temp\b7c048465cfc09a8649043c0571a84d1edff4a8509e80dc55470fbbc83f0c618.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2600
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
          3⤵
            PID:2184
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"
            3⤵
              PID:2060
            • C:\Windows\System32\svchost.exe
              "C:\Windows\System32\svchost.exe"
              3⤵
                PID:2984
              • C:\Windows\System32\notepad.exe
                "C:\Windows\System32\notepad.exe"
                3⤵
                  PID:2536
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                  3⤵
                    PID:2520
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
                    3⤵
                      PID:2460
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe"
                      3⤵
                        PID:2360
                      • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                        "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
                        3⤵
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2828
                        • C:\Windows\SysWOW64\control.exe
                          "C:\Windows\SysWOW64\control.exe"
                          4⤵
                          • Adds policy Run key to start application
                          • Adds Run key to start application
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Modifies Internet Explorer settings
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2884
                          • C:\Program Files\Mozilla Firefox\Firefox.exe
                            "C:\Program Files\Mozilla Firefox\Firefox.exe"
                            5⤵
                              PID:2024
                        • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
                          3⤵
                            PID:2964
                        • C:\Windows\SysWOW64\autochk.exe
                          "C:\Windows\SysWOW64\autochk.exe"
                          2⤵
                            PID:3008

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Roaming\9-LBS3SE\9-Llogim.jpeg

                          Filesize

                          76KB

                          MD5

                          02a2628d66a778e6650467deeba76bcc

                          SHA1

                          367187a352fb45fb8fd248e3b17461a508a21f1b

                          SHA256

                          c3559476fffd23bb4d96389faf5947229650bea148ef8968aefa602ee528d53c

                          SHA512

                          247665b63bd19af70d2acd0518a9cb24a3694556c916ddc00647d54302fb5f36f3871194538e3910271eb1f8fb5d2bfd599703b79f564cfb7629202e93bea27a

                        • C:\Users\Admin\AppData\Roaming\9-LBS3SE\9-Llogrf.ini

                          Filesize

                          40B

                          MD5

                          2f245469795b865bdd1b956c23d7893d

                          SHA1

                          6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

                          SHA256

                          1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

                          SHA512

                          909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

                        • C:\Users\Admin\AppData\Roaming\9-LBS3SE\9-Llogri.ini

                          Filesize

                          40B

                          MD5

                          d63a82e5d81e02e399090af26db0b9cb

                          SHA1

                          91d0014c8f54743bba141fd60c9d963f869d76c9

                          SHA256

                          eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

                          SHA512

                          38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

                        • C:\Users\Admin\AppData\Roaming\9-LBS3SE\9-Llogrv.ini

                          Filesize

                          40B

                          MD5

                          ba3b6bc807d4f76794c4b81b09bb9ba5

                          SHA1

                          24cb89501f0212ff3095ecc0aba97dd563718fb1

                          SHA256

                          6eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507

                          SHA512

                          ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf

                        • memory/1192-53-0x0000000004C00000-0x0000000004CB9000-memory.dmp

                          Filesize

                          740KB

                        • memory/1192-44-0x00000000071D0000-0x000000000735A000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/1192-55-0x0000000004C00000-0x0000000004CB9000-memory.dmp

                          Filesize

                          740KB

                        • memory/1192-47-0x0000000006750000-0x00000000068B0000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/1192-57-0x0000000004C00000-0x0000000004CB9000-memory.dmp

                          Filesize

                          740KB

                        • memory/1192-43-0x0000000006750000-0x00000000068B0000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/1192-39-0x00000000071D0000-0x000000000735A000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/2184-4-0x0000000000400000-0x000000000042F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2184-6-0x0000000000400000-0x000000000042F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2600-34-0x000007FEF5D10000-0x000007FEF66FC000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/2600-0-0x000007FEF5D13000-0x000007FEF5D14000-memory.dmp

                          Filesize

                          4KB

                        • memory/2600-3-0x000007FEF5D10000-0x000007FEF66FC000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/2600-2-0x0000000002020000-0x00000000020A8000-memory.dmp

                          Filesize

                          544KB

                        • memory/2600-1-0x0000000000110000-0x000000000019C000-memory.dmp

                          Filesize

                          560KB

                        • memory/2828-32-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                          Filesize

                          4KB

                        • memory/2828-41-0x0000000000400000-0x000000000042F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2828-42-0x0000000000210000-0x0000000000225000-memory.dmp

                          Filesize

                          84KB

                        • memory/2828-37-0x0000000000400000-0x000000000042F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2828-38-0x00000000001D0000-0x00000000001E5000-memory.dmp

                          Filesize

                          84KB

                        • memory/2828-35-0x0000000000850000-0x0000000000B53000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/2828-33-0x0000000000400000-0x000000000042F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2884-45-0x0000000000E70000-0x0000000000E8F000-memory.dmp

                          Filesize

                          124KB

                        • memory/2884-48-0x0000000000080000-0x00000000000AF000-memory.dmp

                          Filesize

                          188KB

                        • memory/2884-46-0x0000000000E70000-0x0000000000E8F000-memory.dmp

                          Filesize

                          124KB