Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2024 18:52

General

  • Target

    Confirm Proforma Invoice.exe

  • Size

    439KB

  • MD5

    c8c984aa8535536070c90dda6d6a46a8

  • SHA1

    431ed99f88f68b9933fbf8b642c44150565852b8

  • SHA256

    a344590804a69e6f50c2386206d5d050db788fcd42716d1c14f77ba501e63d4e

  • SHA512

    14d10fab4f19796e53e2075bc9b27df8f217af28d97ea250f2ae5f83421bb568bd3a58888e89ad036a4b5a4a2d3d388ffbd4f914c6f9c28e7c165f487a47c5c9

  • SSDEEP

    12288:OCv2zv1grDRQiSSJWP7BCBkNAUqIwrk6WjL2iN:OV212BCmNAUarqn1

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

rwo

Decoy

highjinxed.com

adwawattan.com

alimitlesslifeinc.com

advancedtelecom.net

metrocommunitycollege.com

modboutik.com

myfavoritethemepark.com

slimwasit.com

curlygirlrizos.com

nyshuffle.com

allovermeofficial.com

bugsy67.com

simcardtonewow.com

onlinepaints.xyz

epoxykingsofamerica.com

cbdstrata.com

liceremovalbellevue.com

bj5w.xyz

lalalae.com

glory-made.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3544
    • C:\Users\Admin\AppData\Local\Temp\Confirm Proforma Invoice.exe
      "C:\Users\Admin\AppData\Local\Temp\Confirm Proforma Invoice.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2792
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:2328
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:4852
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:3836
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:1564
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\SysWOW64\rundll32.exe"
              2⤵
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4892
              • C:\Windows\SysWOW64\cmd.exe
                /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
                3⤵
                • System Location Discovery: System Language Discovery
                PID:764
              • C:\Program Files\Mozilla Firefox\Firefox.exe
                "C:\Program Files\Mozilla Firefox\Firefox.exe"
                3⤵
                  PID:3800

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\DB1

              Filesize

              40KB

              MD5

              a182561a527f929489bf4b8f74f65cd7

              SHA1

              8cd6866594759711ea1836e86a5b7ca64ee8911f

              SHA256

              42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

              SHA512

              9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

            • C:\Users\Admin\AppData\Roaming\N72196U1\N72logim.jpeg

              Filesize

              83KB

              MD5

              e9af4a5f47942a291603b1bb2059c168

              SHA1

              bbb8e51b98d45a6b9fa3f0504e0937bb2f85c329

              SHA256

              3f302e81580fc011e9550712ce851189faf7087a5dfff4cf58a82f4a39a3fb95

              SHA512

              aaa194b839f8dea802c53801f5948b0c9ec8b9765391a2619ab792065fc83b79ff6213048d27cbc00a0533d087d56788fe5c21b9f188b26b834033ee5364f250

            • C:\Users\Admin\AppData\Roaming\N72196U1\N72logrf.ini

              Filesize

              40B

              MD5

              2f245469795b865bdd1b956c23d7893d

              SHA1

              6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

              SHA256

              1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

              SHA512

              909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

            • C:\Users\Admin\AppData\Roaming\N72196U1\N72logrg.ini

              Filesize

              38B

              MD5

              4aadf49fed30e4c9b3fe4a3dd6445ebe

              SHA1

              1e332822167c6f351b99615eada2c30a538ff037

              SHA256

              75034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56

              SHA512

              eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945

            • C:\Users\Admin\AppData\Roaming\N72196U1\N72logri.ini

              Filesize

              40B

              MD5

              d63a82e5d81e02e399090af26db0b9cb

              SHA1

              91d0014c8f54743bba141fd60c9d963f869d76c9

              SHA256

              eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

              SHA512

              38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

            • C:\Users\Admin\AppData\Roaming\N72196U1\N72logrv.ini

              Filesize

              872B

              MD5

              bbc41c78bae6c71e63cb544a6a284d94

              SHA1

              33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a

              SHA256

              ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb

              SHA512

              0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

            • memory/2016-10-0x0000000075080000-0x0000000075830000-memory.dmp

              Filesize

              7.7MB

            • memory/2016-13-0x0000000005A90000-0x0000000005AC6000-memory.dmp

              Filesize

              216KB

            • memory/2016-8-0x0000000004B60000-0x0000000004B78000-memory.dmp

              Filesize

              96KB

            • memory/2016-9-0x000000007508E000-0x000000007508F000-memory.dmp

              Filesize

              4KB

            • memory/2016-6-0x0000000004E00000-0x0000000004E56000-memory.dmp

              Filesize

              344KB

            • memory/2016-11-0x0000000005A40000-0x0000000005A96000-memory.dmp

              Filesize

              344KB

            • memory/2016-12-0x0000000004DF0000-0x0000000004DF6000-memory.dmp

              Filesize

              24KB

            • memory/2016-7-0x0000000075080000-0x0000000075830000-memory.dmp

              Filesize

              7.7MB

            • memory/2016-5-0x0000000004B40000-0x0000000004B4A000-memory.dmp

              Filesize

              40KB

            • memory/2016-16-0x0000000075080000-0x0000000075830000-memory.dmp

              Filesize

              7.7MB

            • memory/2016-0-0x000000007508E000-0x000000007508F000-memory.dmp

              Filesize

              4KB

            • memory/2016-4-0x0000000004BF0000-0x0000000004C82000-memory.dmp

              Filesize

              584KB

            • memory/2016-3-0x00000000051A0000-0x0000000005744000-memory.dmp

              Filesize

              5.6MB

            • memory/2016-2-0x0000000004A90000-0x0000000004B2C000-memory.dmp

              Filesize

              624KB

            • memory/2016-1-0x0000000000040000-0x00000000000B4000-memory.dmp

              Filesize

              464KB

            • memory/2792-17-0x0000000001790000-0x0000000001ADA000-memory.dmp

              Filesize

              3.3MB

            • memory/2792-23-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2792-24-0x0000000001B30000-0x0000000001B44000-memory.dmp

              Filesize

              80KB

            • memory/2792-20-0x0000000001770000-0x0000000001784000-memory.dmp

              Filesize

              80KB

            • memory/2792-19-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2792-14-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/3544-26-0x00000000080E0000-0x00000000081FD000-memory.dmp

              Filesize

              1.1MB

            • memory/3544-44-0x00000000082F0000-0x0000000008454000-memory.dmp

              Filesize

              1.4MB

            • memory/3544-50-0x0000000008570000-0x00000000086D3000-memory.dmp

              Filesize

              1.4MB

            • memory/3544-25-0x00000000082F0000-0x0000000008454000-memory.dmp

              Filesize

              1.4MB

            • memory/3544-21-0x00000000080E0000-0x00000000081FD000-memory.dmp

              Filesize

              1.1MB

            • memory/4892-27-0x0000000000FF0000-0x0000000001004000-memory.dmp

              Filesize

              80KB

            • memory/4892-29-0x0000000000FF0000-0x0000000001004000-memory.dmp

              Filesize

              80KB