Analysis

  • max time kernel
    145s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 11:02

General

  • Target

    bothb4762.exe

  • Size

    291KB

  • MD5

    e40716ec136991058a86358953c71a27

  • SHA1

    08401ceead3c6cbd5e4d187b29b6fdf9725cf63d

  • SHA256

    f1e8731c7e1849989749c9ff23497e310025a9536fea8d25ccab050db2fffe33

  • SHA512

    a6cd0a9194da99a1dedbc1d99b0bd600a055aa1b9478a1d7831ab88e64dd0216b11eef0d24c128bcd77d0e68273fb961f1ff8ff230056379ca48108a64d25b11

  • SSDEEP

    6144:MfAn+VymyRH+jffLf+4J+8IiTA7PmgtZrZ+XWlu:MfAOBYejffLRw8IjjrYGE

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

lt0h

Decoy

originalindigofurniture.co.uk

fl6588.com

acecademy.com

yaerofinerindalnalising.com

mendilovic.online

rishenght.com

famlees.com

myhomeofficemarket.com

bouquetarabia.com

chrisbani.com

freebandslegally.com

hernandezinsurancegroup.net

slicedandfresh.com

apnathikanas.com

chadhatesyou.com

ansilsas.com

in3development.com

nitiren.net

peespn.com

valengz.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\bothb4762.exe
      "C:\Users\Admin\AppData\Local\Temp\bothb4762.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Users\Admin\AppData\Local\Temp\bothb4762.exe
        "C:\Users\Admin\AppData\Local\Temp\bothb4762.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1532
    • C:\Windows\SysWOW64\cscript.exe
      "C:\Windows\SysWOW64\cscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:844
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\bothb4762.exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/844-11-0x00000000002F0000-0x0000000000312000-memory.dmp

    Filesize

    136KB

  • memory/844-10-0x00000000002F0000-0x0000000000312000-memory.dmp

    Filesize

    136KB

  • memory/1224-12-0x0000000004F60000-0x00000000050E4000-memory.dmp

    Filesize

    1.5MB

  • memory/1224-6-0x00000000042C0000-0x00000000044C0000-memory.dmp

    Filesize

    2.0MB

  • memory/1224-7-0x0000000004F60000-0x00000000050E4000-memory.dmp

    Filesize

    1.5MB

  • memory/1224-16-0x00000000082B0000-0x00000000083F4000-memory.dmp

    Filesize

    1.3MB

  • memory/1224-17-0x00000000082B0000-0x00000000083F4000-memory.dmp

    Filesize

    1.3MB

  • memory/1224-19-0x00000000082B0000-0x00000000083F4000-memory.dmp

    Filesize

    1.3MB

  • memory/1532-5-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1532-2-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2312-3-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2312-1-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2312-0-0x0000000000413000-0x0000000000414000-memory.dmp

    Filesize

    4KB