Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23-12-2024 14:47

General

  • Target

    bb4c6c01b5e866d18d6d6559242b42e79ca9980cd9dfa0db7b4331395a6b5204.exe

  • Size

    241KB

  • MD5

    cb7d4c1dc8b01bf82bb52937e5deeac4

  • SHA1

    458dba8f4563cd030afb237d69293208d71149ad

  • SHA256

    bb4c6c01b5e866d18d6d6559242b42e79ca9980cd9dfa0db7b4331395a6b5204

  • SHA512

    3565215740241e089565892b74108c0cd408433803d4fd435fc8f5ca878b23ced260732ffb59d617bdb91bf7429af630464bb6718469d35ffa10f2aaab8cb633

  • SSDEEP

    6144:HNeZmj7TSnqxNkECqXi2g8mKtIQgfCHaK2r1:HNljvbxNVCqXiJ8zIQ7aKE1

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

nk6l

Decoy

cbnextra.com

entitysystemsinc.com

55midwoodave.com

ebelizzi.com

khojcity.com

1527brokenoakdrive.site

housinghproperties.com

ratiousa.com

lrcrepresentacoes.net

tocoec.net

khadamatdemnate.com

davidkastner.xyz

gardeniaresort.com

qiantangguoji.com

visaprepaidprocessinq.com

cristinamadara.com

semapisus.xyz

mpwebagency.net

alibabasdeli.com

gigasupplies.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Users\Admin\AppData\Local\Temp\bb4c6c01b5e866d18d6d6559242b42e79ca9980cd9dfa0db7b4331395a6b5204.exe
      "C:\Users\Admin\AppData\Local\Temp\bb4c6c01b5e866d18d6d6559242b42e79ca9980cd9dfa0db7b4331395a6b5204.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Users\Admin\AppData\Local\Temp\uyzzokhns.exe
        C:\Users\Admin\AppData\Local\Temp\uyzzokhns.exe C:\Users\Admin\AppData\Local\Temp\exhfalpw
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2024
        • C:\Users\Admin\AppData\Local\Temp\uyzzokhns.exe
          C:\Users\Admin\AppData\Local\Temp\uyzzokhns.exe C:\Users\Admin\AppData\Local\Temp\exhfalpw
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2016
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\uyzzokhns.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\exhfalpw

    Filesize

    4KB

    MD5

    0822c633a0ac58fd25ce73eeb959f4c1

    SHA1

    e5bf5daf96e475ee50796a051b4ca9749b6d7a8f

    SHA256

    087f688071a1e7081b435756668883d393546bafd81270a16f61870ac9eda3a8

    SHA512

    f8869b97ecb992b4727efd652a7b835907a86db39712257e9ebee2c3469c6f5a0e1380bbaf077e66f338f5f22c569a3d05a9a2e21eef26d3b6e1a90e1b59573a

  • C:\Users\Admin\AppData\Local\Temp\zq3jossht9qtwr9qc

    Filesize

    212KB

    MD5

    5860d5089dab44b3cff2e069f272e2ad

    SHA1

    7ee5a2e6702c5e18637d98a7abe4c7e7645451b6

    SHA256

    d10e73800fbba7998a4f8a7a6bf57b1f343f447864080e196e966e6a3b22e435

    SHA512

    214da883c24bb31d1452953fdb73ac991276b15c9800356eeb6b2138fbb4909cc758fd9b3aa5eced847062cb3a5ae623bf92486c995242a53e19b411f65c8aab

  • \Users\Admin\AppData\Local\Temp\uyzzokhns.exe

    Filesize

    5KB

    MD5

    78bbf1cff4144ac88fb2fa7a53196d91

    SHA1

    c7daf19ac7143a2e02173d03223a9bcbcb6e44b9

    SHA256

    2a46132c92ba642674b00ea5df006856498d67b30f64ca5c74061303b056ec0f

    SHA512

    5eb68cdaaeec7990b1358853a7a2c2b01ff81c24d1cdf2e931a20475bcb1957ac4a42f723e51b2c1a51bf837d0af784d0681027634d6260d04f400d618e9a4a6

  • memory/1408-17-0x0000000006E90000-0x0000000006FF3000-memory.dmp

    Filesize

    1.4MB

  • memory/1408-23-0x0000000006E90000-0x0000000006FF3000-memory.dmp

    Filesize

    1.4MB

  • memory/2016-14-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2016-16-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2024-11-0x00000000001C0000-0x00000000001C2000-memory.dmp

    Filesize

    8KB

  • memory/2476-18-0x00000000009F0000-0x00000000009F9000-memory.dmp

    Filesize

    36KB

  • memory/2476-21-0x00000000009F0000-0x00000000009F9000-memory.dmp

    Filesize

    36KB

  • memory/2476-22-0x0000000000080000-0x00000000000AF000-memory.dmp

    Filesize

    188KB