Analysis

  • max time kernel
    147s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 06:03

General

  • Target

    e29feb7fcc81e09ebf6a86b0d620c54e1a134ab98cbd9c13323bf5a6ae7e9088.exe

  • Size

    282KB

  • MD5

    a8566feb30efadda298aa9aa48ed6231

  • SHA1

    3500451818de70121de56672eae034a73674ac55

  • SHA256

    e29feb7fcc81e09ebf6a86b0d620c54e1a134ab98cbd9c13323bf5a6ae7e9088

  • SHA512

    c8ce0767ec6e6c6bbb23169ea5a0981e3dd49b794d09065d84bcc200f27a5543d39b20991955cddb351350f93d75fdfef871f2c6bcacca00abe57cea06122397

  • SSDEEP

    6144:MEa0NZojwkXWEwM3e6YMrKpnTCNATU5H4yjyY:XZ+nWZM3eRM+pnTCn5ByY

Malware Config

Extracted

Family

formbook

Campaign

u6hu

Decoy

OvIuZKrtOMxghbaZbvb/8h9g+Q==

mjHLVEVO8gwVeZ+7

Lh1lcZzH8pTXgpdDzV0vzyVooAsviHQ=

OzJXhMQYaQKNT1aBY/gM8h9g+Q==

WSJFbX28mK+jXVvRJofdtSc=

mEv6JdT2o7Nq++XYt8MFpx5QrhRdhA==

Wxf/NnjMRlBj6JK3jg==

nB21Q0tg7gEVeZ+7

IZinOswGUPAn51eHvCAoMetC

INxV9PYg7AQP0xyDAyg=

kkZP+Iq1AgMVeZ+7

meuru6sSaxxuoLS7gA==

y0jMTFyffedqCSRXVfm/

sJbTfRVKuQScxw==

+ecHP3ayIjYFnb7j2Pt6z5dK

uZnHRwRE9QwVeZ+7

ZBg6Sy054P4oHp0DknCx

nFXn8j4yTuJ9aOfNlw==

35ygHt8uASpReRyDAyg=

8nT3T+8eWeh6aOfNlw==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\AppData\Local\Temp\e29feb7fcc81e09ebf6a86b0d620c54e1a134ab98cbd9c13323bf5a6ae7e9088.exe
      "C:\Users\Admin\AppData\Local\Temp\e29feb7fcc81e09ebf6a86b0d620c54e1a134ab98cbd9c13323bf5a6ae7e9088.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe
        "C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1944
        • C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe
          "C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2288
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:2428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe

    Filesize

    100KB

    MD5

    3d5e9bfede23e9c1b446fc3f9274d764

    SHA1

    0844992797324021269266770a5c77d31f4ae95f

    SHA256

    77a8bd4f7e493bf79ecc66caeabfa0e769c8a236cf67c61c94d5f8c58cc69d3e

    SHA512

    6c8f750bbb4d35c055390d72c3b8232e646390155532517640fa479ee0b2d1891997ff18d26c01a1d66c9d751d3f6215387f1df12d73f0249acdc7827647cb52

  • C:\Users\Admin\AppData\Local\Temp\udcaflqnoy.sk

    Filesize

    5KB

    MD5

    7602d66da5640cb773c3b532ca34d3a0

    SHA1

    3f3207d37be60e4fde2cabb4b3847b8871fa2428

    SHA256

    ee0cfa3692c315da80ec77794aed97dc18991b69f52372bab355b17dba5e0533

    SHA512

    0974eeca1f3e59d5a0382a860044143e430db08b937bb557cfbb16bc326770e8da852bd14df79ced204e5d0352c8a48fd0ccbc7265c228bb93857350a1a0215b

  • C:\Users\Admin\AppData\Local\Temp\ywlksxmah.ls

    Filesize

    184KB

    MD5

    44bc927ca1bd29b6171b02f5a350e31c

    SHA1

    3c37defc56421de9eed728b8f78ea86c57475114

    SHA256

    7c867fd5ff083e918b37c08e3677819cbd85156520a27d0a9ab2a6d19726cf8b

    SHA512

    cb607e06cc2efadaf0540833a249b1c4eb1f358e7935fb489fb3f663f65664a8a98283edea394c04a6a18c17d82f057814bf4483e37b46876fe91fd36289a76a

  • memory/1196-25-0x0000000004EF0000-0x0000000004FB7000-memory.dmp

    Filesize

    796KB

  • memory/1196-21-0x0000000004EF0000-0x0000000004FB7000-memory.dmp

    Filesize

    796KB

  • memory/1944-8-0x0000000000270000-0x0000000000272000-memory.dmp

    Filesize

    8KB

  • memory/2288-18-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2288-17-0x0000000000AF0000-0x0000000000DF3000-memory.dmp

    Filesize

    3.0MB

  • memory/2288-15-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2288-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2288-20-0x0000000000160000-0x0000000000170000-memory.dmp

    Filesize

    64KB

  • memory/2288-16-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2288-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2428-22-0x0000000000E90000-0x0000000000E99000-memory.dmp

    Filesize

    36KB

  • memory/2428-23-0x0000000000E90000-0x0000000000E99000-memory.dmp

    Filesize

    36KB

  • memory/2428-24-0x0000000000080000-0x00000000000AD000-memory.dmp

    Filesize

    180KB