Analysis

  • max time kernel
    146s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 01:25

General

  • Target

    AT0001-Purchase order.exe

  • Size

    316KB

  • MD5

    a98ae50f4a149db303f4e345c900c9f1

  • SHA1

    5fbda81750c932bf64d2a57d773867679953bc90

  • SHA256

    d93009185b1d089f922fbfc67ab4097a178f63b5f18f538a88b24a869ab70c12

  • SHA512

    45aa93cc3031e44b5d2478d918b6004932a3bbd51b9930cc47124aa67f3e0a1a1a830d170e0f959cf63423cb99b66eba2e3188047a579d2cd155dc96c103dbf6

  • SSDEEP

    6144:kNeZOWWFI0Dp6DHuZlsljfVaR9gnrBfp3lT:kN5WWFI0SHzlj3nr9pVT

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

gd08

Decoy

discover-tiktok.com

vgyvgycc.com

mrsg.xyz

alredwan.net

d1guoji.com

0519bjw.com

robinhoodplu.com

thechickscincinnati.com

efq2ci2.cfd

vgas4.xyz

s3y4b19.cfd

desertcaviar.com

capricho.xyz

flaujae.com

lensmaintenance3.com

1kjia39.cfd

tqn6.com

needammuntionnotaride.com

2681h.com

braincloudstudios.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\AT0001-Purchase order.exe
      "C:\Users\Admin\AppData\Local\Temp\AT0001-Purchase order.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Users\Admin\AppData\Local\Temp\xhxsojqn.exe
        C:\Users\Admin\AppData\Local\Temp\xhxsojqn.exe C:\Users\Admin\AppData\Local\Temp\lrtvm
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:808
        • C:\Users\Admin\AppData\Local\Temp\xhxsojqn.exe
          C:\Users\Admin\AppData\Local\Temp\xhxsojqn.exe C:\Users\Admin\AppData\Local\Temp\lrtvm
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:836
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\xhxsojqn.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\fn2rh4b8n9ntpdlwnu

    Filesize

    210KB

    MD5

    a54aa4b50f7094b132058491a76ebfa8

    SHA1

    10443981f6085918b774825a7e865be88ea45d6a

    SHA256

    93b2893199ee2f6b28e761bfd621d612bb438b95f652bc995490f73094dcb7d5

    SHA512

    64c1286730796087f1656af8b365b57fd3cba6d7b9fdda45002c92413b0d0cd40322e2da6717001f5a74d03a35124f85d0f87104f793396a717a24fb8835a3bd

  • C:\Users\Admin\AppData\Local\Temp\lrtvm

    Filesize

    4KB

    MD5

    eab172f7c2a6cd4dda552caf2d97b71d

    SHA1

    d2c997bc8f5ee13e6e4efc87f5214ae0259b021f

    SHA256

    724703b34be8f256a1fbe8734619063dd0d3bf3c05e444f47d29691bd941d84e

    SHA512

    5975d239634bf8cb95c3a6d6f629e90d17bd98670551dbbdb823aa06083340a514ce79de86e12306a3ef3092965350cd5240250756091a98016a1aabc8c77fb1

  • C:\Users\Admin\AppData\Local\Temp\xhxsojqn.exe

    Filesize

    4KB

    MD5

    cfb2774909a615a38d13977af09c6885

    SHA1

    53f7c365ec213d93da2d73250d706afd824c76d5

    SHA256

    8506e5d45c6f8e51e89c0e8e188f4bb0b5c3eb1c98a0d3dc7085087156382508

    SHA512

    da94a4ea2d0dcb75e45f9d7a36f413607ed521946539b6178840893c7ff066a259a8e5ed137ab4513473499776f251695f0180d7d9cb1656ba4f57c921e22b9d

  • memory/808-14-0x0000000000250000-0x0000000000252000-memory.dmp

    Filesize

    8KB

  • memory/836-17-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/836-19-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1192-20-0x0000000002EB0000-0x0000000002FB0000-memory.dmp

    Filesize

    1024KB

  • memory/1192-21-0x0000000004D40000-0x0000000004EB9000-memory.dmp

    Filesize

    1.5MB

  • memory/1192-27-0x0000000004D40000-0x0000000004EB9000-memory.dmp

    Filesize

    1.5MB

  • memory/2776-24-0x00000000007B0000-0x00000000007B9000-memory.dmp

    Filesize

    36KB

  • memory/2776-25-0x00000000007B0000-0x00000000007B9000-memory.dmp

    Filesize

    36KB

  • memory/2776-26-0x0000000000080000-0x00000000000AF000-memory.dmp

    Filesize

    188KB