Analysis

  • max time kernel
    146s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 10:19

General

  • Target

    Quote NoRYU15674.exe

  • Size

    534KB

  • MD5

    4f75b9d6f4765318096199de4cc501a6

  • SHA1

    ca57a26c665ec2b566fbd0c103cf44f6e0102810

  • SHA256

    3295195cc0beb345e8af43273cbedbfcc631c4498f7a91bb1dfa82bfd1cda67b

  • SHA512

    7596620eba746ebf0784970c80cf5c3ef563acb70dd0dd8a5762c0690e27eb84e311216924d82de8d28c47d3faec67a2507cb75a217364715fb25d37b7c6eecc

  • SSDEEP

    12288:GAsiJr6HjcETqvMrrSYuQY413gIaENyztD00sxxi0/js:DFlgXTgMKI9Q0NaC0

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

b26m

Decoy

zmdjsbe.com

fredandbettysdogtreats.com

naaacyjl.xyz

chestermclean.net

hbxemu.com

daniandlaila.com

liantongquan.com

clubdjportugal.online

ambcu.com

clinkssamui4.xyz

oebfcdtwwkdpspq.com

swnlmu.com

asctechagent.com

melhorearotina.online

infohouseti.com

busstoppanicbutton.com

cheyennewindenergy.com

partlee.com

855408.com

beyourownbossbyob.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe
      "C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe
        "C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2804
    • C:\Windows\SysWOW64\raserver.exe
      "C:\Windows\SysWOW64\raserver.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1236-19-0x00000000052B0000-0x00000000053D2000-memory.dmp

    Filesize

    1.1MB

  • memory/1236-23-0x00000000052B0000-0x00000000053D2000-memory.dmp

    Filesize

    1.1MB

  • memory/2244-5-0x0000000074400000-0x0000000074AEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2244-2-0x0000000074400000-0x0000000074AEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2244-4-0x000000007440E000-0x000000007440F000-memory.dmp

    Filesize

    4KB

  • memory/2244-0-0x000000007440E000-0x000000007440F000-memory.dmp

    Filesize

    4KB

  • memory/2244-6-0x0000000000AB0000-0x0000000000B18000-memory.dmp

    Filesize

    416KB

  • memory/2244-1-0x0000000000C80000-0x0000000000D0C000-memory.dmp

    Filesize

    560KB

  • memory/2244-3-0x00000000003E0000-0x00000000003EA000-memory.dmp

    Filesize

    40KB

  • memory/2244-14-0x0000000074400000-0x0000000074AEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2332-20-0x0000000000B90000-0x0000000000BAC000-memory.dmp

    Filesize

    112KB

  • memory/2332-21-0x0000000000B90000-0x0000000000BAC000-memory.dmp

    Filesize

    112KB

  • memory/2332-22-0x0000000000080000-0x00000000000AF000-memory.dmp

    Filesize

    188KB

  • memory/2804-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2804-9-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2804-18-0x0000000000140000-0x0000000000154000-memory.dmp

    Filesize

    80KB

  • memory/2804-17-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2804-15-0x0000000000D10000-0x0000000001013000-memory.dmp

    Filesize

    3.0MB

  • memory/2804-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2804-7-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB