Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 02:44

General

  • Target

    c051df779b1823d423877e93d930056050b6b817948e3377405c8b8087566d0c.exe

  • Size

    750KB

  • MD5

    5678d33c2d6c778d533ea9df8105572b

  • SHA1

    2cf4b4b47ff854af37c7b930dfdb1a9b44e70d1e

  • SHA256

    c051df779b1823d423877e93d930056050b6b817948e3377405c8b8087566d0c

  • SHA512

    7981fd5cbc82995c3f12c55348bc0e73a94f9827a5f087ba8686c6016cc386151a158bb2423f42e61e9ad17b69b349ed9a31da3aa07eaeea03a65c4127e5fafc

  • SSDEEP

    12288:/gDBdSpuu7l3MnVPxlbwtNH22qla5w/yXbxpVpami/yIyqS5mdeBFf:/gDBCuYliVPxVeH0MW/IbxpeuS2Ff

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

f1s1

Decoy

dapps.estate

pgt9u.xyz

standoutmarion.com

wk6dr0w3wachi.xyz

graciebarralibertyhill.com

gruenzeug.biz

pannen.xyz

project-foresite.com

xtlvyou.com

magpie.asia

aomih.com

rockellar.com

indeecast.com

newbriswaberkah.com

rosecoolupholder.quest

agffeahqq.xyz

elboutika.online

thehubwub.com

8cycle.solutions

cubied.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c051df779b1823d423877e93d930056050b6b817948e3377405c8b8087566d0c.exe
    "C:\Users\Admin\AppData\Local\Temp\c051df779b1823d423877e93d930056050b6b817948e3377405c8b8087566d0c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Local\Temp\c051df779b1823d423877e93d930056050b6b817948e3377405c8b8087566d0c.exe
      C:\Users\Admin\AppData\Local\Temp\c051df779b1823d423877e93d930056050b6b817948e3377405c8b8087566d0c.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2004-0-0x000000007480E000-0x000000007480F000-memory.dmp

    Filesize

    4KB

  • memory/2004-1-0x0000000000040000-0x0000000000102000-memory.dmp

    Filesize

    776KB

  • memory/2004-2-0x0000000074800000-0x0000000074FB0000-memory.dmp

    Filesize

    7.7MB

  • memory/2004-3-0x000000007480E000-0x000000007480F000-memory.dmp

    Filesize

    4KB

  • memory/2004-4-0x0000000074800000-0x0000000074FB0000-memory.dmp

    Filesize

    7.7MB

  • memory/2004-5-0x00000000006C0000-0x000000000077A000-memory.dmp

    Filesize

    744KB

  • memory/2004-6-0x0000000000950000-0x000000000099C000-memory.dmp

    Filesize

    304KB

  • memory/2004-7-0x0000000005810000-0x00000000058A2000-memory.dmp

    Filesize

    584KB

  • memory/2004-11-0x0000000074800000-0x0000000074FB0000-memory.dmp

    Filesize

    7.7MB

  • memory/4564-9-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4564-12-0x0000000001290000-0x00000000015DA000-memory.dmp

    Filesize

    3.3MB