Analysis

  • max time kernel
    146s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    23-12-2024 20:06

General

  • Target

    QUALITY SCALES CONTROL PO , PDF.exe

  • Size

    512KB

  • MD5

    599a2f1f7ae79d79e8811886a74db3a0

  • SHA1

    c22dfc6ef39b158b403e9e2fa035847af9f6d524

  • SHA256

    e1bd2c6c40bb7f29fc0f7d164f0d8061ec4cd33edac6db75c0810b10b19aeb3e

  • SHA512

    3e580af9d144d36d850062ac466cf0930905708a032f865389d22ee672fba8d459d022255c6b8dcae3b75bd83fd739524b004c2144436c16c11c949511804abf

  • SSDEEP

    12288:A6onlduxjoHbCaFLq/l4WCJHMBJvGdhL:6nruxseOWCJsLv

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ewws

Decoy

gesundheitscoaching.one

leonspropertysolutions.com

urbancoderz.com

abybo.com

crybabysmensclub.com

russiaentertainment.com

lfgprima.com

snatchtime.net

cnrollershoes.com

gdddpc.com

psychicpatrol.com

minnienucup.com

thankscred.com

huellanaranja.com

office365microsoft.com

nisithailand.com

jumlasx.xyz

edm191.com

cleaoshop.com

najjarnabil.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RCidCypDzVJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp848B.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2448
      • C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe
        "C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2424
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp848B.tmp

    Filesize

    1KB

    MD5

    f5b862833281c5924ad34d6390780fe7

    SHA1

    912a11f91deb5aabeb7f4d61eef0c27f1d6a3a50

    SHA256

    01c507f30c4877aeb18820f9fe58f57be407afeb016c6ade17b918039ba8bea7

    SHA512

    acb7ee1d6cacfa7a3e856b14c6d6e2638c730af4433f34a1818360b8c8d88b24f52f7a78b590218b217a5b0bad9f2856de04e92f6824149e0ab0cc9de08ecb21

  • memory/1284-22-0x0000000007500000-0x000000000767A000-memory.dmp

    Filesize

    1.5MB

  • memory/1284-26-0x0000000007500000-0x000000000767A000-memory.dmp

    Filesize

    1.5MB

  • memory/1284-28-0x0000000000010000-0x0000000000020000-memory.dmp

    Filesize

    64KB

  • memory/2000-23-0x0000000000AA0000-0x0000000000AAD000-memory.dmp

    Filesize

    52KB

  • memory/2000-24-0x0000000000AA0000-0x0000000000AAD000-memory.dmp

    Filesize

    52KB

  • memory/2000-25-0x00000000000C0000-0x00000000000EE000-memory.dmp

    Filesize

    184KB

  • memory/2140-3-0x00000000740C0000-0x00000000747AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2140-6-0x00000000047E0000-0x0000000004842000-memory.dmp

    Filesize

    392KB

  • memory/2140-5-0x00000000740C0000-0x00000000747AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2140-0-0x00000000740CE000-0x00000000740CF000-memory.dmp

    Filesize

    4KB

  • memory/2140-4-0x00000000740CE000-0x00000000740CF000-memory.dmp

    Filesize

    4KB

  • memory/2140-17-0x00000000740C0000-0x00000000747AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2140-2-0x0000000000470000-0x000000000047E000-memory.dmp

    Filesize

    56KB

  • memory/2140-1-0x0000000000870000-0x00000000008F6000-memory.dmp

    Filesize

    536KB

  • memory/2424-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2424-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2424-21-0x0000000000190000-0x00000000001A4000-memory.dmp

    Filesize

    80KB

  • memory/2424-18-0x0000000000A90000-0x0000000000D93000-memory.dmp

    Filesize

    3.0MB

  • memory/2424-13-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2424-16-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2424-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB