Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2024 22:08

General

  • Target

    ORDER NO VOL- 6542 335 22.exe

  • Size

    1.0MB

  • MD5

    d59478fd8ef62d1006e85001c3ac59f3

  • SHA1

    aaf63576f5f1f412547c51bee18f88deeb06d36a

  • SHA256

    af9c39c609e5cda424ed4cd2fbe7f32c0d9d2936754d41c098a7dec269c42fd2

  • SHA512

    7184b20f299cf019d9a8f260fc8fd135b7e5b558a4e4061b10f2930a80949aef67de2bd9293770585cef7a677fdacef69cbaa61a688905118c717d4ced98999c

  • SSDEEP

    24576:E1RcJw0mlJ5noiNiGLU8GXplgs8PErrmDgvqOR:Ezc6jnvQr8GQormDIjR

Malware Config

Extracted

Family

formbook

Campaign

nquy

Decoy

a3sidprVANFTG0llIjdA

amYQhcIbS9blLB0=

GOqH7AZQZTYBOB8vWeHGwCVnUw==

kp1yw+EwVCesxslPY5gtZ2aiBcRa

zV/0O1+y47mCh6+5

uX0OU3R898WRBa/Rog==

6val8whPkGM9wuxTFGNI

ozzlSYzyF/XOgNSKG5fsoNYzkk+pxgDF

sHo2h6PuHfFwtOdTFGNI

xZ54yOceUB/thMxtzhp4wCVnUw==

s4pIou5HdD3C1snrARcqXw==

jiOqEVW81qEjTIs5ouY+1hZ3MGvCJg==

Nga3BkamwZ4gVmz0fb5KkYs=

DNeA3Bp8vJpd8VPogb5KkYs=

tbZjsdPoeu0sRcPUqA==

RToES3S3EqV3+g2XLLtFzOHPMXwE7JvN

+c+C3eYzcETJ8hehDlIno5I=

3KE0kK71Hf/ODgNTFGNI

MPrCqTAJbjGx

fkXl/0uKuIgIDPB+aeTYSA==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\ORDER NO VOL- 6542 335 22.exe
      "C:\Users\Admin\AppData\Local\Temp\ORDER NO VOL- 6542 335 22.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Users\Admin\AppData\Local\Temp\ORDER NO VOL- 6542 335 22.exe
        "C:\Users\Admin\AppData\Local\Temp\ORDER NO VOL- 6542 335 22.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2844
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 744
        3⤵
        • Program crash
        PID:2896
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:2876
      • C:\Windows\SysWOW64\autofmt.exe
        "C:\Windows\SysWOW64\autofmt.exe"
        2⤵
          PID:2400
        • C:\Windows\SysWOW64\autofmt.exe
          "C:\Windows\SysWOW64\autofmt.exe"
          2⤵
            PID:2784
          • C:\Windows\SysWOW64\autofmt.exe
            "C:\Windows\SysWOW64\autofmt.exe"
            2⤵
              PID:2888
            • C:\Windows\SysWOW64\autofmt.exe
              "C:\Windows\SysWOW64\autofmt.exe"
              2⤵
                PID:2644
              • C:\Windows\SysWOW64\autofmt.exe
                "C:\Windows\SysWOW64\autofmt.exe"
                2⤵
                  PID:2728
                • C:\Windows\SysWOW64\autofmt.exe
                  "C:\Windows\SysWOW64\autofmt.exe"
                  2⤵
                    PID:2672
                  • C:\Windows\SysWOW64\autofmt.exe
                    "C:\Windows\SysWOW64\autofmt.exe"
                    2⤵
                      PID:2348
                    • C:\Windows\SysWOW64\autofmt.exe
                      "C:\Windows\SysWOW64\autofmt.exe"
                      2⤵
                        PID:2616
                      • C:\Windows\SysWOW64\autofmt.exe
                        "C:\Windows\SysWOW64\autofmt.exe"
                        2⤵
                          PID:2612
                        • C:\Windows\SysWOW64\autofmt.exe
                          "C:\Windows\SysWOW64\autofmt.exe"
                          2⤵
                            PID:2632
                          • C:\Windows\SysWOW64\autofmt.exe
                            "C:\Windows\SysWOW64\autofmt.exe"
                            2⤵
                              PID:2648
                            • C:\Windows\SysWOW64\NETSTAT.EXE
                              "C:\Windows\SysWOW64\NETSTAT.EXE"
                              2⤵
                              • Loads dropped DLL
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Gathers network information
                              • Modifies Internet Explorer settings
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: MapViewOfSection
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:2680
                              • C:\Program Files\Mozilla Firefox\Firefox.exe
                                "C:\Program Files\Mozilla Firefox\Firefox.exe"
                                3⤵
                                  PID:2596

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\6ldh_r4.zip

                              Filesize

                              440KB

                              MD5

                              5d874a46532117f82095481976117fa1

                              SHA1

                              0a33fdef5084db25e24451dbde80238b487fbe78

                              SHA256

                              d6ccab1423559c6cf50202bc81a4576f969aa9c275eaaeb9a2ac2c827cd60447

                              SHA512

                              f0624277f3b4839c836291e1d1eb03cda875ba192243427afa967819b213f0cdade02f22e20b786b4680e4faaef20c045ad0a456d5f85fc04d3ab2e081ff4c61

                            • \Users\Admin\AppData\Local\Temp\sqlite3.dll

                              Filesize

                              841KB

                              MD5

                              5fc6cd5d5ca1489d2a3c361717359a95

                              SHA1

                              5c630e232cd5761e7a611e41515be4afa3e7a141

                              SHA256

                              85c8b8a648c56cf5f063912e0e26ecebb90e0caf2f442fd5cdd8287301fe7e81

                              SHA512

                              5f9124a721f6b463d4f980920e87925098aa753b0fa2a59a3ff48b48d2b1a45d760fd46445414d84fb66321181cd2c82a4194361811114c15e35b42f838ab792

                            • memory/1236-23-0x0000000004340000-0x0000000004436000-memory.dmp

                              Filesize

                              984KB

                            • memory/1236-28-0x0000000004340000-0x0000000004436000-memory.dmp

                              Filesize

                              984KB

                            • memory/1236-32-0x0000000007740000-0x00000000078BD000-memory.dmp

                              Filesize

                              1.5MB

                            • memory/1236-22-0x00000000031D0000-0x00000000032D0000-memory.dmp

                              Filesize

                              1024KB

                            • memory/1236-33-0x0000000007740000-0x00000000078BD000-memory.dmp

                              Filesize

                              1.5MB

                            • memory/1236-35-0x0000000007740000-0x00000000078BD000-memory.dmp

                              Filesize

                              1.5MB

                            • memory/2380-4-0x00000000749DE000-0x00000000749DF000-memory.dmp

                              Filesize

                              4KB

                            • memory/2380-8-0x0000000005180000-0x00000000051F2000-memory.dmp

                              Filesize

                              456KB

                            • memory/2380-7-0x0000000008000000-0x00000000080CA000-memory.dmp

                              Filesize

                              808KB

                            • memory/2380-6-0x0000000000410000-0x000000000041C000-memory.dmp

                              Filesize

                              48KB

                            • memory/2380-5-0x00000000749D0000-0x00000000750BE000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/2380-3-0x0000000000400000-0x0000000000414000-memory.dmp

                              Filesize

                              80KB

                            • memory/2380-2-0x00000000749D0000-0x00000000750BE000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/2380-0-0x00000000749DE000-0x00000000749DF000-memory.dmp

                              Filesize

                              4KB

                            • memory/2380-24-0x00000000749D0000-0x00000000750BE000-memory.dmp

                              Filesize

                              6.9MB

                            • memory/2380-1-0x0000000000BD0000-0x0000000000CDC000-memory.dmp

                              Filesize

                              1.0MB

                            • memory/2680-26-0x0000000000BE0000-0x0000000000BE9000-memory.dmp

                              Filesize

                              36KB

                            • memory/2680-25-0x0000000000BE0000-0x0000000000BE9000-memory.dmp

                              Filesize

                              36KB

                            • memory/2680-27-0x0000000000080000-0x00000000000AD000-memory.dmp

                              Filesize

                              180KB

                            • memory/2680-77-0x0000000061E00000-0x0000000061EBF000-memory.dmp

                              Filesize

                              764KB

                            • memory/2844-20-0x0000000000400000-0x000000000042F000-memory.dmp

                              Filesize

                              188KB

                            • memory/2844-21-0x0000000000110000-0x0000000000120000-memory.dmp

                              Filesize

                              64KB

                            • memory/2844-18-0x0000000000CE0000-0x0000000000FE3000-memory.dmp

                              Filesize

                              3.0MB

                            • memory/2844-11-0x0000000000400000-0x000000000042F000-memory.dmp

                              Filesize

                              188KB

                            • memory/2844-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                              Filesize

                              4KB

                            • memory/2844-15-0x0000000000400000-0x000000000042F000-memory.dmp

                              Filesize

                              188KB

                            • memory/2844-9-0x0000000000400000-0x000000000042F000-memory.dmp

                              Filesize

                              188KB

                            • memory/2844-17-0x0000000000400000-0x000000000042F000-memory.dmp

                              Filesize

                              188KB