Analysis

  • max time kernel
    146s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2024 14:33

General

  • Target

    Halkbank.exe

  • Size

    732KB

  • MD5

    8e6067fd802c5cac596f7bf91bd7e255

  • SHA1

    d25e4cb1263bf84e46851c819886393a645cb1a6

  • SHA256

    761a2e999afac422bbf2879ffdbd2aea8f9adc8ced10e640d7ff0e295e5ccd97

  • SHA512

    cb4e0e838b83fb38fbdd3665b042a03c215ba6f02bf06e7a530195b482b7baf70ea8c14b06b92e9a5ef5fdf604b1fd5f3f8681f9b42afa9531b51e464afbc519

  • SSDEEP

    12288:AujjPHHwHmUvKBkYdLvqniPB9YXo/7hGrlzV8Pb0EDzbrDcPYD1PehJOE0H9PuZ/:AMPwHTvHYdLyMMXojhGxUb0EXw+WhJOq

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

dlwk

Decoy

universitypinesseniorliving.com

mtcy0852.com

abslevha.com

breedersbatch.com

longlivegenx.com

yibaogy.com

sex8e.com

luxsot.com

arizonafinevioins.com

lalabusha.xyz

everycases.net

unhealthyisunweathly.com

anchorphonemounts.com

teachuswell.com

theshadedco.com

wallopchain.com

balitourexplore.com

resctub.com

freshlyfadedapparel.com

betamartgroceries.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Users\Admin\AppData\Local\Temp\Halkbank.exe
      "C:\Users\Admin\AppData\Local\Temp\Halkbank.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5112
      • C:\Users\Admin\AppData\Local\Temp\Halkbank.exe
        "C:\Users\Admin\AppData\Local\Temp\Halkbank.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1388
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3456
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Halkbank.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1388-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1388-17-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1388-18-0x0000000001610000-0x0000000001624000-memory.dmp

    Filesize

    80KB

  • memory/1388-15-0x00000000016A0000-0x00000000019EA000-memory.dmp

    Filesize

    3.3MB

  • memory/3456-20-0x0000000000BF0000-0x0000000000C04000-memory.dmp

    Filesize

    80KB

  • memory/3456-22-0x0000000000BF0000-0x0000000000C04000-memory.dmp

    Filesize

    80KB

  • memory/3516-19-0x00000000085E0000-0x000000000871E000-memory.dmp

    Filesize

    1.2MB

  • memory/3516-30-0x0000000002CC0000-0x0000000002D59000-memory.dmp

    Filesize

    612KB

  • memory/3516-28-0x0000000002CC0000-0x0000000002D59000-memory.dmp

    Filesize

    612KB

  • memory/3516-27-0x0000000002CC0000-0x0000000002D59000-memory.dmp

    Filesize

    612KB

  • memory/3516-23-0x00000000085E0000-0x000000000871E000-memory.dmp

    Filesize

    1.2MB

  • memory/5112-9-0x0000000074770000-0x0000000074F20000-memory.dmp

    Filesize

    7.7MB

  • memory/5112-4-0x0000000004F40000-0x0000000004FDC000-memory.dmp

    Filesize

    624KB

  • memory/5112-14-0x0000000074770000-0x0000000074F20000-memory.dmp

    Filesize

    7.7MB

  • memory/5112-3-0x0000000004DB0000-0x0000000004E42000-memory.dmp

    Filesize

    584KB

  • memory/5112-2-0x0000000005450000-0x00000000059F4000-memory.dmp

    Filesize

    5.6MB

  • memory/5112-1-0x0000000000310000-0x00000000003CC000-memory.dmp

    Filesize

    752KB

  • memory/5112-11-0x0000000006940000-0x00000000069A4000-memory.dmp

    Filesize

    400KB

  • memory/5112-0-0x000000007477E000-0x000000007477F000-memory.dmp

    Filesize

    4KB

  • memory/5112-10-0x00000000067A0000-0x000000000683C000-memory.dmp

    Filesize

    624KB

  • memory/5112-5-0x0000000074770000-0x0000000074F20000-memory.dmp

    Filesize

    7.7MB

  • memory/5112-8-0x000000007477E000-0x000000007477F000-memory.dmp

    Filesize

    4KB

  • memory/5112-7-0x0000000005000000-0x0000000005016000-memory.dmp

    Filesize

    88KB

  • memory/5112-6-0x0000000004E50000-0x0000000004E5A000-memory.dmp

    Filesize

    40KB