Analysis

  • max time kernel
    147s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 09:34

General

  • Target

    gecikmis bakiye.exe

  • Size

    213KB

  • MD5

    2374db6853cf78b15f31892c43180857

  • SHA1

    5eddc78b5d56fdac3e42af18cf1b5cada38368f5

  • SHA256

    92c5014b109cf6b18dbd0466a0b2ce20bb3900d667747c069a367d98651f419a

  • SHA512

    021b1f2d467729ee479f25c6be7a5417ecf889ac86d3d340c9cb5fbb741278a6cb3d30921b18ed2d359e16630acfb22abe26240f94f7214d1e3b1d1347d3d24e

  • SSDEEP

    6144:HNeZmDuFbUmUCYmtm8X9UiZ5KQzgg4pWI:HNlD4beF4ZzZ5tqH

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

d23n

Decoy

keralalotteryresults.com

cosnerreview.com

tilcompanies.com

tokomakmurjaya.xyz

twmarketz.com

spytfyre.com

eyerafitnessapp.com

faswebs.com

hotcinfin.com

modifidecars.com

xn--rhqwesct95oo2g0ro.com

fruitfulgreenhousefacility.com

pomidor.biz

volondamasterclass.com

latexbbs.com

kkh222.com

ratted.xyz

littlejohnsinc.com

vacationdealscorp.website

bitcoinbil3arabi.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Users\Admin\AppData\Local\Temp\gecikmis bakiye.exe
      "C:\Users\Admin\AppData\Local\Temp\gecikmis bakiye.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2468
      • C:\Users\Admin\AppData\Local\Temp\jnkbb.exe
        C:\Users\Admin\AppData\Local\Temp\jnkbb.exe C:\Users\Admin\AppData\Local\Temp\vocoxc
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Users\Admin\AppData\Local\Temp\jnkbb.exe
          C:\Users\Admin\AppData\Local\Temp\jnkbb.exe C:\Users\Admin\AppData\Local\Temp\vocoxc
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2884
    • C:\Windows\SysWOW64\autoconv.exe
      "C:\Windows\SysWOW64\autoconv.exe"
      2⤵
        PID:2740
      • C:\Windows\SysWOW64\autoconv.exe
        "C:\Windows\SysWOW64\autoconv.exe"
        2⤵
          PID:2196
        • C:\Windows\SysWOW64\autoconv.exe
          "C:\Windows\SysWOW64\autoconv.exe"
          2⤵
            PID:2992
          • C:\Windows\SysWOW64\autoconv.exe
            "C:\Windows\SysWOW64\autoconv.exe"
            2⤵
              PID:2768
            • C:\Windows\SysWOW64\autoconv.exe
              "C:\Windows\SysWOW64\autoconv.exe"
              2⤵
                PID:2204
              • C:\Windows\SysWOW64\autoconv.exe
                "C:\Windows\SysWOW64\autoconv.exe"
                2⤵
                  PID:2928
                • C:\Windows\SysWOW64\autoconv.exe
                  "C:\Windows\SysWOW64\autoconv.exe"
                  2⤵
                    PID:2916
                  • C:\Windows\SysWOW64\autoconv.exe
                    "C:\Windows\SysWOW64\autoconv.exe"
                    2⤵
                      PID:2708
                    • C:\Windows\SysWOW64\autoconv.exe
                      "C:\Windows\SysWOW64\autoconv.exe"
                      2⤵
                        PID:2976
                      • C:\Windows\SysWOW64\autoconv.exe
                        "C:\Windows\SysWOW64\autoconv.exe"
                        2⤵
                          PID:2632
                        • C:\Windows\SysWOW64\autoconv.exe
                          "C:\Windows\SysWOW64\autoconv.exe"
                          2⤵
                            PID:2628
                          • C:\Windows\SysWOW64\autoconv.exe
                            "C:\Windows\SysWOW64\autoconv.exe"
                            2⤵
                              PID:2184
                            • C:\Windows\SysWOW64\autoconv.exe
                              "C:\Windows\SysWOW64\autoconv.exe"
                              2⤵
                                PID:2856
                              • C:\Windows\SysWOW64\autoconv.exe
                                "C:\Windows\SysWOW64\autoconv.exe"
                                2⤵
                                  PID:2920
                                • C:\Windows\SysWOW64\autoconv.exe
                                  "C:\Windows\SysWOW64\autoconv.exe"
                                  2⤵
                                    PID:2908
                                  • C:\Windows\SysWOW64\autoconv.exe
                                    "C:\Windows\SysWOW64\autoconv.exe"
                                    2⤵
                                      PID:2652
                                    • C:\Windows\SysWOW64\autoconv.exe
                                      "C:\Windows\SysWOW64\autoconv.exe"
                                      2⤵
                                        PID:2660
                                      • C:\Windows\SysWOW64\autoconv.exe
                                        "C:\Windows\SysWOW64\autoconv.exe"
                                        2⤵
                                          PID:1872
                                        • C:\Windows\SysWOW64\netsh.exe
                                          "C:\Windows\SysWOW64\netsh.exe"
                                          2⤵
                                          • Suspicious use of SetThreadContext
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious behavior: MapViewOfSection
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:2608
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /c del "C:\Users\Admin\AppData\Local\Temp\jnkbb.exe"
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3064

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Temp\9ld5l4aehf

                                        Filesize

                                        184KB

                                        MD5

                                        bcb5d52ddc64d21055e3e2e24b685d30

                                        SHA1

                                        1d8ebad7e6565f551ec472ebfcfebbb348166e19

                                        SHA256

                                        52a683fb786dd4bdee1b9507a4a43ca57e4bfd3441f8884f5a275686220ab961

                                        SHA512

                                        ae1bd1bf99d68c933273c2d8183f18962b8ea31ac53a12726c103cef4ef37824e914abd2f8b379d2be44f125a94ef9929b64ce19983a45e7a58bde290f16ff32

                                      • C:\Users\Admin\AppData\Local\Temp\vocoxc

                                        Filesize

                                        5KB

                                        MD5

                                        4164b3fc5d4fe4efb82020c68d870877

                                        SHA1

                                        e9c0faac746dbc5e86cd4acd9f447ce9900fc56e

                                        SHA256

                                        0fd13e41a4eb916d6a3098b16ca3402569cddfc5095d8db6ce235d93956440f0

                                        SHA512

                                        a4898ace453e8e08ca92be645af521b2d41e7e189fc0bdcd7792607d37f2b3fc300431e309d9b2bc0ad4d6c067bfd7d3b7d951dccc1fb706bf71b19b76d15a64

                                      • \Users\Admin\AppData\Local\Temp\jnkbb.exe

                                        Filesize

                                        4KB

                                        MD5

                                        513ec601b4cd4e5b3453805337b08116

                                        SHA1

                                        1494f6490d448ec0d5a16817b4e02b9c093f93c2

                                        SHA256

                                        ca770e8d07d951e267ad1a84d247a0ca50376b92f0f022bfb8920c620ea71a06

                                        SHA512

                                        3b367b6af540b150a0b8f833379c3a9328d0a58342affd4b56afa66fabbb608146bf67e8d72748ee9b56bc39caf256e0a4716934a57bf96376905e403da75f1f

                                      • memory/1184-16-0x0000000004060000-0x0000000004260000-memory.dmp

                                        Filesize

                                        2.0MB

                                      • memory/1184-17-0x00000000051E0000-0x000000000537E000-memory.dmp

                                        Filesize

                                        1.6MB

                                      • memory/1184-23-0x00000000051E0000-0x000000000537E000-memory.dmp

                                        Filesize

                                        1.6MB

                                      • memory/2608-20-0x00000000013E0000-0x00000000013FB000-memory.dmp

                                        Filesize

                                        108KB

                                      • memory/2608-21-0x00000000013E0000-0x00000000013FB000-memory.dmp

                                        Filesize

                                        108KB

                                      • memory/2608-22-0x0000000000080000-0x00000000000AF000-memory.dmp

                                        Filesize

                                        188KB

                                      • memory/2716-9-0x0000000000230000-0x0000000000232000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/2884-12-0x0000000000400000-0x000000000042F000-memory.dmp

                                        Filesize

                                        188KB

                                      • memory/2884-15-0x0000000000400000-0x000000000042F000-memory.dmp

                                        Filesize

                                        188KB