Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 10:19

General

  • Target

    Quote NoRYU15674.exe

  • Size

    534KB

  • MD5

    4f75b9d6f4765318096199de4cc501a6

  • SHA1

    ca57a26c665ec2b566fbd0c103cf44f6e0102810

  • SHA256

    3295195cc0beb345e8af43273cbedbfcc631c4498f7a91bb1dfa82bfd1cda67b

  • SHA512

    7596620eba746ebf0784970c80cf5c3ef563acb70dd0dd8a5762c0690e27eb84e311216924d82de8d28c47d3faec67a2507cb75a217364715fb25d37b7c6eecc

  • SSDEEP

    12288:GAsiJr6HjcETqvMrrSYuQY413gIaENyztD00sxxi0/js:DFlgXTgMKI9Q0NaC0

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

b26m

Decoy

zmdjsbe.com

fredandbettysdogtreats.com

naaacyjl.xyz

chestermclean.net

hbxemu.com

daniandlaila.com

liantongquan.com

clubdjportugal.online

ambcu.com

clinkssamui4.xyz

oebfcdtwwkdpspq.com

swnlmu.com

asctechagent.com

melhorearotina.online

infohouseti.com

busstoppanicbutton.com

cheyennewindenergy.com

partlee.com

855408.com

beyourownbossbyob.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe
      "C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:628
      • C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe
        "C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"
        3⤵
          PID:2764
        • C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe
          "C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"
          3⤵
            PID:4028
          • C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe
            "C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"
            3⤵
              PID:3608
            • C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe
              "C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"
              3⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:728
          • C:\Windows\SysWOW64\raserver.exe
            "C:\Windows\SysWOW64\raserver.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4664
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4832

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/628-13-0x00000000743F0000-0x0000000074BA0000-memory.dmp

          Filesize

          7.7MB

        • memory/628-7-0x00000000743FE000-0x00000000743FF000-memory.dmp

          Filesize

          4KB

        • memory/628-2-0x0000000007480000-0x0000000007A24000-memory.dmp

          Filesize

          5.6MB

        • memory/628-3-0x0000000006F70000-0x0000000007002000-memory.dmp

          Filesize

          584KB

        • memory/628-4-0x00000000743F0000-0x0000000074BA0000-memory.dmp

          Filesize

          7.7MB

        • memory/628-5-0x00000000023D0000-0x00000000023DA000-memory.dmp

          Filesize

          40KB

        • memory/628-6-0x00000000023E0000-0x00000000023EA000-memory.dmp

          Filesize

          40KB

        • memory/628-0-0x00000000743FE000-0x00000000743FF000-memory.dmp

          Filesize

          4KB

        • memory/628-8-0x00000000743F0000-0x0000000074BA0000-memory.dmp

          Filesize

          7.7MB

        • memory/628-9-0x0000000008530000-0x00000000085CC000-memory.dmp

          Filesize

          624KB

        • memory/628-10-0x0000000008490000-0x00000000084F8000-memory.dmp

          Filesize

          416KB

        • memory/628-1-0x0000000000150000-0x00000000001DC000-memory.dmp

          Filesize

          560KB

        • memory/728-17-0x0000000001380000-0x0000000001394000-memory.dmp

          Filesize

          80KB

        • memory/728-14-0x0000000001860000-0x0000000001BAA000-memory.dmp

          Filesize

          3.3MB

        • memory/728-11-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/728-16-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3520-27-0x0000000008740000-0x0000000008813000-memory.dmp

          Filesize

          844KB

        • memory/3520-23-0x0000000002CF0000-0x0000000002DED000-memory.dmp

          Filesize

          1012KB

        • memory/3520-18-0x0000000002CF0000-0x0000000002DED000-memory.dmp

          Filesize

          1012KB

        • memory/3520-28-0x0000000008740000-0x0000000008813000-memory.dmp

          Filesize

          844KB

        • memory/3520-30-0x0000000008740000-0x0000000008813000-memory.dmp

          Filesize

          844KB

        • memory/4664-21-0x0000000000F60000-0x0000000000F7F000-memory.dmp

          Filesize

          124KB

        • memory/4664-19-0x0000000000F60000-0x0000000000F7F000-memory.dmp

          Filesize

          124KB

        • memory/4664-22-0x0000000000CD0000-0x0000000000CFF000-memory.dmp

          Filesize

          188KB