Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2024 20:06

General

  • Target

    QUALITY SCALES CONTROL PO , PDF.exe

  • Size

    512KB

  • MD5

    599a2f1f7ae79d79e8811886a74db3a0

  • SHA1

    c22dfc6ef39b158b403e9e2fa035847af9f6d524

  • SHA256

    e1bd2c6c40bb7f29fc0f7d164f0d8061ec4cd33edac6db75c0810b10b19aeb3e

  • SHA512

    3e580af9d144d36d850062ac466cf0930905708a032f865389d22ee672fba8d459d022255c6b8dcae3b75bd83fd739524b004c2144436c16c11c949511804abf

  • SSDEEP

    12288:A6onlduxjoHbCaFLq/l4WCJHMBJvGdhL:6nruxseOWCJsLv

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ewws

Decoy

gesundheitscoaching.one

leonspropertysolutions.com

urbancoderz.com

abybo.com

crybabysmensclub.com

russiaentertainment.com

lfgprima.com

snatchtime.net

cnrollershoes.com

gdddpc.com

psychicpatrol.com

minnienucup.com

thankscred.com

huellanaranja.com

office365microsoft.com

nisithailand.com

jumlasx.xyz

edm191.com

cleaoshop.com

najjarnabil.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3380
    • C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RCidCypDzVJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2A04.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:4428
      • C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe
        "C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe"
        3⤵
          PID:4588
        • C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe
          "C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2868
      • C:\Windows\SysWOW64\autoconv.exe
        "C:\Windows\SysWOW64\autoconv.exe"
        2⤵
          PID:3624
        • C:\Windows\SysWOW64\wscript.exe
          "C:\Windows\SysWOW64\wscript.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4492
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2952

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmp2A04.tmp

        Filesize

        1KB

        MD5

        92a81299240417fb2740b43d473dc939

        SHA1

        ddd172b4ceed424e460afa10dd7279fe1536e5c4

        SHA256

        4b9215a74120ed506ebd0dd8b2425413f7a41392b8c856924993a93e82930a42

        SHA512

        5cbfcd3fc1a0a86b1e005a4860f65fde633bf1b3427123a2466aba9382f48a7fcf7a11244fb26627fb85db2c680ca2a3d1dccbe1fd9b42b0b159e876eeaeeb15

      • memory/2732-6-0x0000000005A20000-0x0000000005A76000-memory.dmp

        Filesize

        344KB

      • memory/2732-19-0x0000000074790000-0x0000000074F40000-memory.dmp

        Filesize

        7.7MB

      • memory/2732-3-0x0000000005CE0000-0x0000000006284000-memory.dmp

        Filesize

        5.6MB

      • memory/2732-4-0x00000000057D0000-0x0000000005862000-memory.dmp

        Filesize

        584KB

      • memory/2732-5-0x0000000005730000-0x000000000573A000-memory.dmp

        Filesize

        40KB

      • memory/2732-0-0x000000007479E000-0x000000007479F000-memory.dmp

        Filesize

        4KB

      • memory/2732-7-0x0000000074790000-0x0000000074F40000-memory.dmp

        Filesize

        7.7MB

      • memory/2732-8-0x0000000005790000-0x000000000579E000-memory.dmp

        Filesize

        56KB

      • memory/2732-9-0x000000007479E000-0x000000007479F000-memory.dmp

        Filesize

        4KB

      • memory/2732-10-0x0000000074790000-0x0000000074F40000-memory.dmp

        Filesize

        7.7MB

      • memory/2732-11-0x0000000006490000-0x00000000064F2000-memory.dmp

        Filesize

        392KB

      • memory/2732-1-0x0000000000C10000-0x0000000000C96000-memory.dmp

        Filesize

        536KB

      • memory/2732-2-0x0000000005640000-0x00000000056DC000-memory.dmp

        Filesize

        624KB

      • memory/2868-23-0x0000000000EB0000-0x0000000000EC4000-memory.dmp

        Filesize

        80KB

      • memory/2868-17-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2868-22-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2868-20-0x0000000000FE0000-0x000000000132A000-memory.dmp

        Filesize

        3.3MB

      • memory/3380-24-0x00000000024B0000-0x0000000002581000-memory.dmp

        Filesize

        836KB

      • memory/3380-28-0x00000000024B0000-0x0000000002581000-memory.dmp

        Filesize

        836KB

      • memory/3380-30-0x0000000008710000-0x000000000884A000-memory.dmp

        Filesize

        1.2MB

      • memory/3380-31-0x0000000008710000-0x000000000884A000-memory.dmp

        Filesize

        1.2MB

      • memory/4492-26-0x0000000000FE0000-0x0000000001007000-memory.dmp

        Filesize

        156KB

      • memory/4492-25-0x0000000000FE0000-0x0000000001007000-memory.dmp

        Filesize

        156KB

      • memory/4492-27-0x0000000000700000-0x000000000072E000-memory.dmp

        Filesize

        184KB