Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 18:05

General

  • Target

    G-77904DOC.exe

  • Size

    300KB

  • MD5

    e133504aa7c92bcc8b358abfa4c36a20

  • SHA1

    68a3dc52c35115003d74c224dfc3f9e95bd00c04

  • SHA256

    58a064152959df9f0b10cb78b8cdcda6eae112619a7239ddc0c18547e7e3a598

  • SHA512

    98b75db2b869e910565321e829689366be7f319cf6f3aaaac65d06a36b6985cbdec0e16261bfeb0f93b8a48d5b1c707ef28deb84430ccb738dff0699a3a5fd60

  • SSDEEP

    6144:rGiwlK7jQRnqGFYtTJJr3+WZmHXH0CNK0d2Rr+oGJyRt1sy2:QcQxYtTbr1Z4/XZMwy2

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

bs11

Decoy

momentumcs.net

gifabricaciones.com

handwerks.design

kalviuniv.com

saatiin.com

anthonyjoelquezada.com

fantasticphoto.sbs

lifespanvisiontherapeutics.com

cameliaandco.com

loftycryphigh.com

webtrajpylive.online

perlerpalace.com

annemacedonia.com

oakandorange.com

arslantrader.com

nanhajim.com

ursula.biz

onlinebusiness.today

shishkin-grow.space

whoami.zone

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Users\Admin\AppData\Local\Temp\G-77904DOC.exe
      "C:\Users\Admin\AppData\Local\Temp\G-77904DOC.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Users\Admin\AppData\Local\Temp\gavvjlio.exe
        C:\Users\Admin\AppData\Local\Temp\gavvjlio.exe C:\Users\Admin\AppData\Local\Temp\rudvuunoky
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Users\Admin\AppData\Local\Temp\gavvjlio.exe
          C:\Users\Admin\AppData\Local\Temp\gavvjlio.exe C:\Users\Admin\AppData\Local\Temp\rudvuunoky
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:3068
    • C:\Windows\SysWOW64\systray.exe
      "C:\Windows\SysWOW64\systray.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\gavvjlio.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\iker7dx2hyvtj44

    Filesize

    213KB

    MD5

    a9a514cd5d9c755b8319c055b0d6d06e

    SHA1

    5717539cbc2ab9a7c01443182abfa50bb0520694

    SHA256

    b53b25f3d0418c286e8d4c78fc4080ecd05f00bd6b39fa16241335bfc05670df

    SHA512

    82f9978685f9877e20b24dd60bb32b05c3c23b54275c107cb7017a15f5802d1540ef10709ae90de0b0cef83e32c57c66063aa1db8f8ef7a6708a40d352d7ecf5

  • C:\Users\Admin\AppData\Local\Temp\rudvuunoky

    Filesize

    4KB

    MD5

    cd2d9713ae5995ee2bf3af08d8eecc52

    SHA1

    c08cf6596eb17e3f52295cef79c51b67c86bf407

    SHA256

    ad332e48b605d4d44a205c3bc93414696b372e08efdb9d423b69452a04db9e67

    SHA512

    e3a5ce9c56ac429f6ab33c79b57580155173bdb9e2f010d952d32ee95e08db893004b6bf37e4665f112b3b2bb01210e71fb125a9772addbc9a9c985224ed3fb5

  • \Users\Admin\AppData\Local\Temp\gavvjlio.exe

    Filesize

    107KB

    MD5

    4f1abaead61fe7411fc7c6ee5082d665

    SHA1

    b4ad83dea14c06e0aa2c2ca582b52a527ec01d77

    SHA256

    e6b54e61fb080c3f6efb98d3ac8d182ad859fee863cc43478c99d3660bec6bd5

    SHA512

    e045f7094df1552776c1542edef3066663fcbfcf7dcd9bc871de273ce087c898aee583f603f34532d94e8ee22f86b550c736ab9232f72c2966cd62613dc5baab

  • memory/1188-18-0x0000000007460000-0x000000000760F000-memory.dmp

    Filesize

    1.7MB

  • memory/1188-22-0x0000000007460000-0x000000000760F000-memory.dmp

    Filesize

    1.7MB

  • memory/2876-9-0x00000000000F0000-0x00000000000F2000-memory.dmp

    Filesize

    8KB

  • memory/3044-20-0x0000000000AF0000-0x0000000000AF5000-memory.dmp

    Filesize

    20KB

  • memory/3044-19-0x0000000000AF0000-0x0000000000AF5000-memory.dmp

    Filesize

    20KB

  • memory/3044-21-0x00000000000C0000-0x00000000000EF000-memory.dmp

    Filesize

    188KB

  • memory/3068-17-0x0000000000180000-0x0000000000194000-memory.dmp

    Filesize

    80KB

  • memory/3068-16-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3068-14-0x00000000008D0000-0x0000000000BD3000-memory.dmp

    Filesize

    3.0MB

  • memory/3068-12-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB