Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 10:42

General

  • Target

    70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe

  • Size

    358KB

  • MD5

    7e9e3aeebbafdb0a1fa065ee5ad217ec

  • SHA1

    6064e1dbc3129e3f69e701946d54191b42eb6a92

  • SHA256

    70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156

  • SHA512

    27fb97317d7484c3c770eb5073b682a76dd76bcb93c3475c979e0d7bf781f7d7de71a51761ea9ee239e53a2d39ad1e986cdc9efa22389934088daef3dec70d33

  • SSDEEP

    6144:rGiF3GRJUnjyWkqKwmT20Wv60Dir1SNuaeTUqUPcLPTS43RIWi1ov2+fmIN5UgK:h3OJMLk5tESVTU8DTS43R4ovPfmWu

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

s11o

Decoy

xrayagitate.site

mirchana.com

ucdaloi.com

mdjzw.xyz

palladiumroyal.com

mrpipewell.site

besar-nih.com

hempfoodeurope.com

newsletter.chat

lgkfs.xyz

didaftik.com

krediburada.xyz

anzu76.com

olafskin.com

mijnlidmaatschap-anwb-nl.xyz

brazilcocktailbar.com

mcgavrin.com

136232.com

omicronvirusnews.com

spanishwithkurt.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe
    "C:\Users\Admin\AppData\Local\Temp\70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe
      "C:\Users\Admin\AppData\Local\Temp\70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsjF558.tmp\orcyebry.dll

    Filesize

    175KB

    MD5

    3b4056f9ef87716b0e0ed45da70d258f

    SHA1

    59efd5883fee51f07066e92753be09454444da62

    SHA256

    a9b13e44fc7a247368e980cf20889619100caad4387662b639923eda30bcf9b9

    SHA512

    accbe50cc40caf0b4b2d0569b67fbcaa64edf35a68104e23e7d941be7ccf2548ae9d1e9b4b271caff0f828220055f50f9176c9eed0871a1c056f6e7cc1d8a04d

  • memory/2516-9-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2932-10-0x0000000075040000-0x0000000075070000-memory.dmp

    Filesize

    192KB

  • memory/2932-7-0x0000000075040000-0x0000000075070000-memory.dmp

    Filesize

    192KB