Analysis

  • max time kernel
    94s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2024 19:10

General

  • Target

    Ordinazione d'acquisto.exe

  • Size

    243KB

  • MD5

    286597866ff97e04ae9360022a28b711

  • SHA1

    13131a0f720f6f0252f4b0dbc3bf4ff47588bf40

  • SHA256

    abd3cca5a11651cd3570b0f40ad43541e31b3dcb5af6bb18f2944c34c1d4a808

  • SHA512

    54d7e501439c1b577f26355ab0066b55568b92248b72fa8fcf8a8a9e74ca4a9c0e07dc9ae3baa8c9163e5749a0da7bc8fb6ec168305df83f78ccd920cc18e69a

  • SSDEEP

    6144:c/HCNGEbGEMV05C98a1iRBVcHn8Cj8Auj7Po2e1cPI1b:MHCN9C101RB66ACVBI1b

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

dn7r

Decoy

eventphotographerdfw.com

thehalalcoinstaking.com

philipfaziofineart.com

intercoh.com

gaiaseyephotography.com

chatbotforrealestate.com

lovelancemg.com

marlieskasberger.com

elcongoenespanol.info

lepirecredit.com

distribution-concept.com

e99game.com

exit11festival.com

twodollartoothbrushclub.com

cocktailsandlawn.com

performimprove.network

24horas-telefono-11840.com

cosmossify.com

kellenleote.com

perovskite.energy

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ordinazione d'acquisto.exe
    "C:\Users\Admin\AppData\Local\Temp\Ordinazione d'acquisto.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1464
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 272
      2⤵
      • Program crash
      PID:1804
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1464 -ip 1464
    1⤵
      PID:1648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1464-1-0x0000000000620000-0x0000000000720000-memory.dmp

      Filesize

      1024KB

    • memory/1464-2-0x00000000005F0000-0x000000000061F000-memory.dmp

      Filesize

      188KB

    • memory/1464-3-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB