Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 06:03

General

  • Target

    e29feb7fcc81e09ebf6a86b0d620c54e1a134ab98cbd9c13323bf5a6ae7e9088.exe

  • Size

    282KB

  • MD5

    a8566feb30efadda298aa9aa48ed6231

  • SHA1

    3500451818de70121de56672eae034a73674ac55

  • SHA256

    e29feb7fcc81e09ebf6a86b0d620c54e1a134ab98cbd9c13323bf5a6ae7e9088

  • SHA512

    c8ce0767ec6e6c6bbb23169ea5a0981e3dd49b794d09065d84bcc200f27a5543d39b20991955cddb351350f93d75fdfef871f2c6bcacca00abe57cea06122397

  • SSDEEP

    6144:MEa0NZojwkXWEwM3e6YMrKpnTCNATU5H4yjyY:XZ+nWZM3eRM+pnTCn5ByY

Malware Config

Extracted

Family

formbook

Campaign

u6hu

Decoy

OvIuZKrtOMxghbaZbvb/8h9g+Q==

mjHLVEVO8gwVeZ+7

Lh1lcZzH8pTXgpdDzV0vzyVooAsviHQ=

OzJXhMQYaQKNT1aBY/gM8h9g+Q==

WSJFbX28mK+jXVvRJofdtSc=

mEv6JdT2o7Nq++XYt8MFpx5QrhRdhA==

Wxf/NnjMRlBj6JK3jg==

nB21Q0tg7gEVeZ+7

IZinOswGUPAn51eHvCAoMetC

INxV9PYg7AQP0xyDAyg=

kkZP+Iq1AgMVeZ+7

meuru6sSaxxuoLS7gA==

y0jMTFyffedqCSRXVfm/

sJbTfRVKuQScxw==

+ecHP3ayIjYFnb7j2Pt6z5dK

uZnHRwRE9QwVeZ+7

ZBg6Sy054P4oHp0DknCx

nFXn8j4yTuJ9aOfNlw==

35ygHt8uASpReRyDAyg=

8nT3T+8eWeh6aOfNlw==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Users\Admin\AppData\Local\Temp\e29feb7fcc81e09ebf6a86b0d620c54e1a134ab98cbd9c13323bf5a6ae7e9088.exe
      "C:\Users\Admin\AppData\Local\Temp\e29feb7fcc81e09ebf6a86b0d620c54e1a134ab98cbd9c13323bf5a6ae7e9088.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:700
      • C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe
        "C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe
          "C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:3680
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\SysWOW64\control.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:244
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:4776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe

      Filesize

      100KB

      MD5

      3d5e9bfede23e9c1b446fc3f9274d764

      SHA1

      0844992797324021269266770a5c77d31f4ae95f

      SHA256

      77a8bd4f7e493bf79ecc66caeabfa0e769c8a236cf67c61c94d5f8c58cc69d3e

      SHA512

      6c8f750bbb4d35c055390d72c3b8232e646390155532517640fa479ee0b2d1891997ff18d26c01a1d66c9d751d3f6215387f1df12d73f0249acdc7827647cb52

    • C:\Users\Admin\AppData\Local\Temp\udcaflqnoy.sk

      Filesize

      5KB

      MD5

      7602d66da5640cb773c3b532ca34d3a0

      SHA1

      3f3207d37be60e4fde2cabb4b3847b8871fa2428

      SHA256

      ee0cfa3692c315da80ec77794aed97dc18991b69f52372bab355b17dba5e0533

      SHA512

      0974eeca1f3e59d5a0382a860044143e430db08b937bb557cfbb16bc326770e8da852bd14df79ced204e5d0352c8a48fd0ccbc7265c228bb93857350a1a0215b

    • C:\Users\Admin\AppData\Local\Temp\ywlksxmah.ls

      Filesize

      184KB

      MD5

      44bc927ca1bd29b6171b02f5a350e31c

      SHA1

      3c37defc56421de9eed728b8f78ea86c57475114

      SHA256

      7c867fd5ff083e918b37c08e3677819cbd85156520a27d0a9ab2a6d19726cf8b

      SHA512

      cb607e06cc2efadaf0540833a249b1c4eb1f358e7935fb489fb3f663f65664a8a98283edea394c04a6a18c17d82f057814bf4483e37b46876fe91fd36289a76a

    • memory/244-20-0x00000000004C0000-0x00000000004ED000-memory.dmp

      Filesize

      180KB

    • memory/244-18-0x0000000000B00000-0x0000000000B27000-memory.dmp

      Filesize

      156KB

    • memory/244-19-0x0000000000B00000-0x0000000000B27000-memory.dmp

      Filesize

      156KB

    • memory/1532-7-0x0000000001000000-0x0000000001002000-memory.dmp

      Filesize

      8KB

    • memory/3464-17-0x0000000006AD0000-0x0000000006C31000-memory.dmp

      Filesize

      1.4MB

    • memory/3464-21-0x0000000006AD0000-0x0000000006C31000-memory.dmp

      Filesize

      1.4MB

    • memory/3464-25-0x0000000008610000-0x000000000877B000-memory.dmp

      Filesize

      1.4MB

    • memory/3464-26-0x0000000008610000-0x000000000877B000-memory.dmp

      Filesize

      1.4MB

    • memory/3464-28-0x0000000008610000-0x000000000877B000-memory.dmp

      Filesize

      1.4MB

    • memory/3680-16-0x0000000001090000-0x00000000010A0000-memory.dmp

      Filesize

      64KB

    • memory/3680-15-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3680-13-0x00000000012C0000-0x000000000160A000-memory.dmp

      Filesize

      3.3MB

    • memory/3680-9-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/3680-12-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB