Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 00:01

General

  • Target

    3ab1cc60bd5dca00fc6cad5cf3c0a7cccea610b20027c9db6b45f0b41860fba5.exe

  • Size

    1.1MB

  • MD5

    71415d61dd3a653e017514280a4e05c4

  • SHA1

    89bed5f613401c5816f3b22816f84d5f8067db3b

  • SHA256

    3ab1cc60bd5dca00fc6cad5cf3c0a7cccea610b20027c9db6b45f0b41860fba5

  • SHA512

    971407b4327c3a9fe1ff76f0ec84874522865ae08f338ec0985a1ef78066a59412d323a4a2731d33dec129c89355b7aa95fe36f4425db8ad6ea1151f5b9c2098

  • SSDEEP

    24576:UAOcZXcxP61ptWw+avL8pnp3qY7daGAuvZG31RMaas/xmR:CH+tWw+S8D3r70QA3XM9n

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

je14

Decoy

innervisionbuildings.com

theenergysocialite.com

565548.com

panghr.com

onlyonesolutions.com

stjohnzone6.com

cnotes.rest

helfeb.online

xixi-s-inc.club

easilyentered.com

theshopx.store

mrclean-ac.com

miamibeachwateradventures.com

jpearce.co.uk

seseragi-bunkou.com

minimaddie.com

commbank-help-849c3.com

segohandelsonderneming.com

namthanhreal.com

fototerapi.online

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Users\Admin\AppData\Local\Temp\3ab1cc60bd5dca00fc6cad5cf3c0a7cccea610b20027c9db6b45f0b41860fba5.exe
      "C:\Users\Admin\AppData\Local\Temp\3ab1cc60bd5dca00fc6cad5cf3c0a7cccea610b20027c9db6b45f0b41860fba5.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Users\Admin\AppData\Roaming\5_29\estrlf.pif
        "C:\Users\Admin\AppData\Roaming\5_29\estrlf.pif" tvsgb.tls
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4528
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          4⤵
            PID:2212
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:1496
      • C:\Windows\SysWOW64\NETSTAT.EXE
        "C:\Windows\SysWOW64\NETSTAT.EXE"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Gathers network information
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2348
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4020

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\5_29\estrlf.pif

      Filesize

      794KB

      MD5

      18e404787e9c044105f5c4bec4600bd8

      SHA1

      9f1015bd7f33a6f3c1cc12c0971f51b1adee1939

      SHA256

      e15984dc8ea9627d370c40178676490129427e2dc23499f68c9c65c4386fea12

      SHA512

      c6a1faae524968351b4841665bfe1c5255f7e6c115b7a81a4b6c65626f23f7f15e4bb856914fce15225c33a2e2b6166b3f1f87698895fe0ce4cb084b630c2a5f

    • C:\Users\Admin\AppData\Roaming\5_29\gdrqa.icm

      Filesize

      41KB

      MD5

      285afea69a2e1f8aae59a0c748aa2bd8

      SHA1

      8a087a497757b6beccf483687fb0d1edec45d3fa

      SHA256

      86aeb596d5962ca2389b1dcc252d0ae7b869b9e6ec319e76a387b0bb16baa910

      SHA512

      2ef2acb9b6377e85e2cf73db99555c91456ecd29dc842dc75f414ff2fbad6667c2c8d0af38a0ffd7a23c7c6a0bb28889671eeb42f61777a0dea85cbfe2cf4404

    • C:\Users\Admin\AppData\Roaming\5_29\xaguexgkmu.xvk

      Filesize

      370KB

      MD5

      56f43e5edcbdfcf4a7e9b8c09c0d2ba2

      SHA1

      1d47312b6eacbf63b04f83a9b4cd2dad238ae17a

      SHA256

      a26e71e81529a9cb7aa276618d014c5275cf3f7c356efb0e6b2308e30727a0fb

      SHA512

      8dd0f07a966aaf0c76fbdbed51184c2d765611128ce9b6e978229dc4954357c78cabef185e636e59827ffb7841913a0d543d60231e1f70aea2d62b0f917eba8a

    • memory/1496-62-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1496-56-0x0000000000F30000-0x000000000127A000-memory.dmp

      Filesize

      3.3MB

    • memory/1496-59-0x0000000000C60000-0x0000000000C74000-memory.dmp

      Filesize

      80KB

    • memory/1496-58-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1496-55-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1496-63-0x0000000000EE0000-0x0000000000EF4000-memory.dmp

      Filesize

      80KB

    • memory/2348-66-0x0000000000580000-0x000000000058B000-memory.dmp

      Filesize

      44KB

    • memory/2348-67-0x0000000000580000-0x000000000058B000-memory.dmp

      Filesize

      44KB

    • memory/2348-68-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3540-60-0x0000000008210000-0x00000000082F7000-memory.dmp

      Filesize

      924KB

    • memory/3540-64-0x0000000008670000-0x0000000008818000-memory.dmp

      Filesize

      1.7MB

    • memory/3540-65-0x0000000008210000-0x00000000082F7000-memory.dmp

      Filesize

      924KB

    • memory/3540-72-0x00000000083B0000-0x0000000008455000-memory.dmp

      Filesize

      660KB