Analysis

  • max time kernel
    148s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 19:59

General

  • Target

    maxx[1].exe

  • Size

    311KB

  • MD5

    5336c524e14753aeacf55d47d243a5c7

  • SHA1

    57dd79737e08b2669fec5926fb6d283e36fccee3

  • SHA256

    58de41e1c48a304c1f7f289fe5c8976d82b8968aae89497adf7c60cda25deaaf

  • SHA512

    9237b2e210b4c9c2a61baec0306d826f0b93fe7f52734ca0fe59a87aa23a453466320ecc49b728ce87bc26d1884e3a7e6b8d0c683497bc10891a5fb88dd5feac

  • SSDEEP

    6144:mbE/HUbSRS5yHZIHRAFP9+yETiVl4e9hwuIfLNEWNLRlRf:mb/iXsWt9+yFV9auOVfj

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

dyh6

Decoy

ximmgepn.xyz

bonitacandle.com

thesneakerhubofficial.com

miabags.online

maboxhistoire.com

viral22.com

gracebruno.xyz

safetycare.xyz

aerith.store

mountaingirlbbq.com

bhbuildertest-ecom.space

klhcn.com

guizhouhl.top

noreply-engagementboost.com

derdmlaucaty.store

viffetrade.com

iesyttsn.xyz

msumon.com

autoforos.com

carlosmorgan.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 4 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\maxx[1].exe
      "C:\Users\Admin\AppData\Local\Temp\maxx[1].exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Users\Admin\AppData\Local\Temp\maxx[1].exe
        "C:\Users\Admin\AppData\Local\Temp\maxx[1].exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2320
    • C:\Windows\SysWOW64\cmstp.exe
      "C:\Windows\SysWOW64\cmstp.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1808
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\maxx[1].exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsjDB24.tmp\iglq.dll

    Filesize

    121KB

    MD5

    07ed356bb53669a56a3d6d04093d1b49

    SHA1

    6c480a1af955ee2633020a0eb2807004fe336f10

    SHA256

    c205c4b93e7dff6cf6e2e301b9bc35668448db47913cef5d30ec78cdeeb16aaf

    SHA512

    1fbdeb195ca1833b5a0edcb62e535dc4deb61b641638dcd78951d4bb476f11780d91834aad3eb5f3f570ed65b599a372f0688226a805fabdb5785d5b9f32f4a9

  • memory/1212-12-0x0000000004F80000-0x00000000050E6000-memory.dmp

    Filesize

    1.4MB

  • memory/1212-15-0x0000000004F80000-0x00000000050E6000-memory.dmp

    Filesize

    1.4MB

  • memory/1212-16-0x0000000006620000-0x0000000006757000-memory.dmp

    Filesize

    1.2MB

  • memory/1212-23-0x0000000006620000-0x0000000006757000-memory.dmp

    Filesize

    1.2MB

  • memory/1808-19-0x0000000000F00000-0x0000000000F18000-memory.dmp

    Filesize

    96KB

  • memory/1808-21-0x0000000000F00000-0x0000000000F18000-memory.dmp

    Filesize

    96KB

  • memory/1808-22-0x0000000000090000-0x00000000000BF000-memory.dmp

    Filesize

    188KB

  • memory/2016-7-0x0000000074CAC000-0x0000000074CAE000-memory.dmp

    Filesize

    8KB

  • memory/2320-9-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2320-11-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2320-14-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB