Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-12-2024 14:33

General

  • Target

    Halkbank.exe

  • Size

    732KB

  • MD5

    8e6067fd802c5cac596f7bf91bd7e255

  • SHA1

    d25e4cb1263bf84e46851c819886393a645cb1a6

  • SHA256

    761a2e999afac422bbf2879ffdbd2aea8f9adc8ced10e640d7ff0e295e5ccd97

  • SHA512

    cb4e0e838b83fb38fbdd3665b042a03c215ba6f02bf06e7a530195b482b7baf70ea8c14b06b92e9a5ef5fdf604b1fd5f3f8681f9b42afa9531b51e464afbc519

  • SSDEEP

    12288:AujjPHHwHmUvKBkYdLvqniPB9YXo/7hGrlzV8Pb0EDzbrDcPYD1PehJOE0H9PuZ/:AMPwHTvHYdLyMMXojhGxUb0EXw+WhJOq

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

dlwk

Decoy

universitypinesseniorliving.com

mtcy0852.com

abslevha.com

breedersbatch.com

longlivegenx.com

yibaogy.com

sex8e.com

luxsot.com

arizonafinevioins.com

lalabusha.xyz

everycases.net

unhealthyisunweathly.com

anchorphonemounts.com

teachuswell.com

theshadedco.com

wallopchain.com

balitourexplore.com

resctub.com

freshlyfadedapparel.com

betamartgroceries.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\Halkbank.exe
      "C:\Users\Admin\AppData\Local\Temp\Halkbank.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Users\Admin\AppData\Local\Temp\Halkbank.exe
        "C:\Users\Admin\AppData\Local\Temp\Halkbank.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2004
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:980
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 268
        3⤵
        • Program crash
        PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/980-23-0x0000000000F80000-0x0000000000F94000-memory.dmp

    Filesize

    80KB

  • memory/980-20-0x0000000000F80000-0x0000000000F94000-memory.dmp

    Filesize

    80KB

  • memory/980-21-0x0000000000F80000-0x0000000000F94000-memory.dmp

    Filesize

    80KB

  • memory/1200-18-0x0000000000010000-0x0000000000020000-memory.dmp

    Filesize

    64KB

  • memory/1200-26-0x00000000064A0000-0x000000000657D000-memory.dmp

    Filesize

    884KB

  • memory/1200-19-0x00000000064A0000-0x000000000657D000-memory.dmp

    Filesize

    884KB

  • memory/2004-16-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2004-14-0x0000000000700000-0x0000000000A03000-memory.dmp

    Filesize

    3.0MB

  • memory/2004-8-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2004-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2004-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2004-9-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2004-17-0x0000000000450000-0x0000000000464000-memory.dmp

    Filesize

    80KB

  • memory/2676-7-0x0000000004BD0000-0x0000000004C34000-memory.dmp

    Filesize

    400KB

  • memory/2676-13-0x0000000073F20000-0x000000007460E000-memory.dmp

    Filesize

    6.9MB

  • memory/2676-0-0x0000000073F2E000-0x0000000073F2F000-memory.dmp

    Filesize

    4KB

  • memory/2676-6-0x0000000008250000-0x00000000082EC000-memory.dmp

    Filesize

    624KB

  • memory/2676-5-0x0000000073F20000-0x000000007460E000-memory.dmp

    Filesize

    6.9MB

  • memory/2676-4-0x0000000073F2E000-0x0000000073F2F000-memory.dmp

    Filesize

    4KB

  • memory/2676-3-0x0000000000210000-0x0000000000226000-memory.dmp

    Filesize

    88KB

  • memory/2676-2-0x0000000073F20000-0x000000007460E000-memory.dmp

    Filesize

    6.9MB

  • memory/2676-1-0x0000000001160000-0x000000000121C000-memory.dmp

    Filesize

    752KB