Analysis

  • max time kernel
    92s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2024 13:11

General

  • Target

    5c2681ca119f8cc0c779cd305088751e4e584600c60da1b0f4b740396d7cd5b2.exe

  • Size

    639KB

  • MD5

    73bbba751e9367feea87e8c6b631fe74

  • SHA1

    0696c691d4a736ccd993c2a2fe9fa052338458a9

  • SHA256

    5c2681ca119f8cc0c779cd305088751e4e584600c60da1b0f4b740396d7cd5b2

  • SHA512

    3e20a45d5e3f3a5ed4d3cf3804e8a9da593896b9c8c8879deda1198cbc31d4ac94a56ec15d1800eea442662818c4967084f4e25b4fe38bd2d4a21bc17ec22c08

  • SSDEEP

    12288:FOjwBJ1xeFyE79nRkCBF5nDdV02vyLNyGGqjKfIBeGeBJ1:FXBJreFVBnZ5DT0QG2IMBJ

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g8dj

Decoy

alenabatik.com

virginiaflowertruck.com

duasirmasespacodebeleza.com

quantobastafestival.com

automationfyre.com

timepiecesforlife.com

safeversion.com

uziforever.xyz

praxz.com

atlasbet273.com

mzczb.xyz

chrisanddimiswedding.com

ywedomedrkrjn.com

dxalmuxp.com

barbergnaum.com

stexl.link

cansohio.com

gopintyourself.com

ivoryowl.net

vacation-discounts.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c2681ca119f8cc0c779cd305088751e4e584600c60da1b0f4b740396d7cd5b2.exe
    "C:\Users\Admin\AppData\Local\Temp\5c2681ca119f8cc0c779cd305088751e4e584600c60da1b0f4b740396d7cd5b2.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4704
    • C:\Users\Admin\AppData\Local\Temp\5c2681ca119f8cc0c779cd305088751e4e584600c60da1b0f4b740396d7cd5b2.exe
      "C:\Users\Admin\AppData\Local\Temp\5c2681ca119f8cc0c779cd305088751e4e584600c60da1b0f4b740396d7cd5b2.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3960-11-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3960-14-0x0000000001830000-0x0000000001B7A000-memory.dmp

    Filesize

    3.3MB

  • memory/4704-6-0x0000000005DB0000-0x0000000005DBC000-memory.dmp

    Filesize

    48KB

  • memory/4704-3-0x0000000005980000-0x0000000005A12000-memory.dmp

    Filesize

    584KB

  • memory/4704-4-0x0000000005A30000-0x0000000005A3A000-memory.dmp

    Filesize

    40KB

  • memory/4704-5-0x00000000747E0000-0x0000000074F90000-memory.dmp

    Filesize

    7.7MB

  • memory/4704-0-0x00000000747EE000-0x00000000747EF000-memory.dmp

    Filesize

    4KB

  • memory/4704-7-0x00000000747EE000-0x00000000747EF000-memory.dmp

    Filesize

    4KB

  • memory/4704-8-0x00000000747E0000-0x0000000074F90000-memory.dmp

    Filesize

    7.7MB

  • memory/4704-9-0x0000000006950000-0x00000000069EC000-memory.dmp

    Filesize

    624KB

  • memory/4704-10-0x0000000006CB0000-0x0000000006D16000-memory.dmp

    Filesize

    408KB

  • memory/4704-2-0x0000000005E30000-0x00000000063D4000-memory.dmp

    Filesize

    5.6MB

  • memory/4704-13-0x00000000747E0000-0x0000000074F90000-memory.dmp

    Filesize

    7.7MB

  • memory/4704-1-0x0000000000EF0000-0x0000000000F96000-memory.dmp

    Filesize

    664KB