Analysis

  • max time kernel
    146s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 10:48

General

  • Target

    quotation inqury.exe

  • Size

    629KB

  • MD5

    fd9b04760439ae4dbe36397690b42380

  • SHA1

    5dc6d63ef88a09d219444a902b99100c2b0e26be

  • SHA256

    15e41f9b684c8df81ae0c2d5d68a036cdf20593fd72d0c7200c2da474a813f30

  • SHA512

    c0aec2a570b5c80da005c113a7e9762bbbfec177ff1473648375c4425e46ded5cb66aff20f2b14f14f84957602add948adc5e9f28027a73704aa8dad1cb76807

  • SSDEEP

    6144:TOnJca2zaKjDtzIiYWOcMQF1Nej+zXtUw3YFlv/Dk9C+rYW:TqiqKjFBHXNeiT2nqt

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

rwo

Decoy

byyter.com

getintimacy.com

toptenvapes.com

coinbaxie.com

fiebluw.info

doerwang.site

795809.com

cuttingquarters.com

loveinspiredtees.com

504oysters.com

laboratoryinterior.com

techguybrian.com

twsexy2mm.com

photocatalystproducts.com

frankfoster.mobi

busingasim.com

cardanoapp.store

fhstzy.com

sanctuarytherapycenter.com

ctc-fra.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Users\Admin\AppData\Local\Temp\quotation inqury.exe
      "C:\Users\Admin\AppData\Local\Temp\quotation inqury.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
        "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2044
    • C:\Windows\SysWOW64\help.exe
      "C:\Windows\SysWOW64\help.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\AddInProcess32.exe

    Filesize

    41KB

    MD5

    6a673bfc3b67ae9782cb31af2f234c68

    SHA1

    7544e89566d91e84e3cd437b9a073e5f6b56566e

    SHA256

    978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

    SHA512

    72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

  • \Users\Admin\AppData\Local\Temp\b1f92ac9-345d-4ee6-83d6-512dab76f3b9\i.dll

    Filesize

    94KB

    MD5

    14ff402962ad21b78ae0b4c43cd1f194

    SHA1

    f8a510eb26666e875a5bdd1cadad40602763ad72

    SHA256

    fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b

    SHA512

    daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

  • memory/1056-36-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-68-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-2-0x00000000004D0000-0x00000000004FC000-memory.dmp

    Filesize

    176KB

  • memory/1056-3-0x0000000073F80000-0x000000007466E000-memory.dmp

    Filesize

    6.9MB

  • memory/1056-72-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-70-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-30-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-66-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-64-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-62-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-60-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-28-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-56-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-54-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-52-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-50-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-48-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-46-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-44-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-42-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-32-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-38-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-0-0x0000000073F8E000-0x0000000073F8F000-memory.dmp

    Filesize

    4KB

  • memory/1056-34-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-40-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-1-0x0000000000870000-0x0000000000912000-memory.dmp

    Filesize

    648KB

  • memory/1056-58-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-26-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-24-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-22-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-20-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-18-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-16-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-14-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-12-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-11-0x00000000004D0000-0x00000000004F6000-memory.dmp

    Filesize

    152KB

  • memory/1056-10-0x0000000073E00000-0x0000000073E80000-memory.dmp

    Filesize

    512KB

  • memory/1056-191-0x0000000073F80000-0x000000007466E000-memory.dmp

    Filesize

    6.9MB

  • memory/1056-193-0x0000000073F80000-0x000000007466E000-memory.dmp

    Filesize

    6.9MB

  • memory/1056-194-0x0000000073F80000-0x000000007466E000-memory.dmp

    Filesize

    6.9MB

  • memory/1056-195-0x0000000000570000-0x000000000057C000-memory.dmp

    Filesize

    48KB

  • memory/1056-206-0x0000000073F80000-0x000000007466E000-memory.dmp

    Filesize

    6.9MB

  • memory/1188-211-0x0000000004FB0000-0x000000000509F000-memory.dmp

    Filesize

    956KB

  • memory/1188-216-0x0000000004FB0000-0x000000000509F000-memory.dmp

    Filesize

    956KB

  • memory/1664-214-0x00000000006A0000-0x00000000006A6000-memory.dmp

    Filesize

    24KB

  • memory/2044-205-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2044-210-0x00000000000F0000-0x0000000000104000-memory.dmp

    Filesize

    80KB

  • memory/2044-209-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2044-208-0x0000000000A40000-0x0000000000D43000-memory.dmp

    Filesize

    3.0MB