Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 00:37

General

  • Target

    quotation inqury.exe

  • Size

    629KB

  • MD5

    fd9b04760439ae4dbe36397690b42380

  • SHA1

    5dc6d63ef88a09d219444a902b99100c2b0e26be

  • SHA256

    15e41f9b684c8df81ae0c2d5d68a036cdf20593fd72d0c7200c2da474a813f30

  • SHA512

    c0aec2a570b5c80da005c113a7e9762bbbfec177ff1473648375c4425e46ded5cb66aff20f2b14f14f84957602add948adc5e9f28027a73704aa8dad1cb76807

  • SSDEEP

    6144:TOnJca2zaKjDtzIiYWOcMQF1Nej+zXtUw3YFlv/Dk9C+rYW:TqiqKjFBHXNeiT2nqt

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

rwo

Decoy

byyter.com

getintimacy.com

toptenvapes.com

coinbaxie.com

fiebluw.info

doerwang.site

795809.com

cuttingquarters.com

loveinspiredtees.com

504oysters.com

laboratoryinterior.com

techguybrian.com

twsexy2mm.com

photocatalystproducts.com

frankfoster.mobi

busingasim.com

cardanoapp.store

fhstzy.com

sanctuarytherapycenter.com

ctc-fra.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3420
    • C:\Users\Admin\AppData\Local\Temp\quotation inqury.exe
      "C:\Users\Admin\AppData\Local\Temp\quotation inqury.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3176
      • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
        "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4232
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\SysWOW64\wscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:216
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe

    Filesize

    42KB

    MD5

    9827ff3cdf4b83f9c86354606736ca9c

    SHA1

    e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723

    SHA256

    c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a

    SHA512

    8261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579

  • C:\Users\Admin\AppData\Local\Temp\b1f92ac9-345d-4ee6-83d6-512dab76f3b9\i.dll

    Filesize

    94KB

    MD5

    14ff402962ad21b78ae0b4c43cd1f194

    SHA1

    f8a510eb26666e875a5bdd1cadad40602763ad72

    SHA256

    fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b

    SHA512

    daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

  • memory/216-214-0x0000000000C60000-0x0000000000C87000-memory.dmp

    Filesize

    156KB

  • memory/3176-39-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-200-0x0000000006EA0000-0x0000000006EAC000-memory.dmp

    Filesize

    48KB

  • memory/3176-36-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-3-0x0000000002C70000-0x0000000002C9C000-memory.dmp

    Filesize

    176KB

  • memory/3176-4-0x0000000005910000-0x0000000005EB4000-memory.dmp

    Filesize

    5.6MB

  • memory/3176-5-0x00000000051F0000-0x0000000005234000-memory.dmp

    Filesize

    272KB

  • memory/3176-6-0x0000000005360000-0x00000000053F2000-memory.dmp

    Filesize

    584KB

  • memory/3176-72-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-76-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-74-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-70-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-68-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-66-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-65-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-62-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-60-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-58-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-56-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-54-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-52-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-48-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-47-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-44-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-42-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-40-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-0-0x0000000074ECE000-0x0000000074ECF000-memory.dmp

    Filesize

    4KB

  • memory/3176-2-0x0000000074EC0000-0x0000000075670000-memory.dmp

    Filesize

    7.7MB

  • memory/3176-34-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-1-0x0000000000760000-0x0000000000802000-memory.dmp

    Filesize

    648KB

  • memory/3176-24-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-22-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-20-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-18-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-16-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-15-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-14-0x0000000073950000-0x00000000739D9000-memory.dmp

    Filesize

    548KB

  • memory/3176-50-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-30-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-28-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-26-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-195-0x0000000074ECE000-0x0000000074ECF000-memory.dmp

    Filesize

    4KB

  • memory/3176-196-0x0000000074EC0000-0x0000000075670000-memory.dmp

    Filesize

    7.7MB

  • memory/3176-197-0x0000000074EC0000-0x0000000075670000-memory.dmp

    Filesize

    7.7MB

  • memory/3176-199-0x0000000074EC0000-0x0000000075670000-memory.dmp

    Filesize

    7.7MB

  • memory/3176-33-0x0000000002C70000-0x0000000002C96000-memory.dmp

    Filesize

    152KB

  • memory/3176-206-0x0000000074EC0000-0x0000000075670000-memory.dmp

    Filesize

    7.7MB

  • memory/3420-211-0x0000000009010000-0x0000000009193000-memory.dmp

    Filesize

    1.5MB

  • memory/3420-216-0x0000000009010000-0x0000000009193000-memory.dmp

    Filesize

    1.5MB

  • memory/3420-220-0x0000000008BE0000-0x0000000008CCF000-memory.dmp

    Filesize

    956KB

  • memory/3420-223-0x0000000008BE0000-0x0000000008CCF000-memory.dmp

    Filesize

    956KB

  • memory/4232-205-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4232-207-0x0000000001810000-0x0000000001B5A000-memory.dmp

    Filesize

    3.3MB

  • memory/4232-210-0x0000000001240000-0x0000000001254000-memory.dmp

    Filesize

    80KB

  • memory/4232-209-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB