Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 05:22

General

  • Target

    98a0baed911fcca09a50dd4dc17f6f65edf26cc6d834681b1d2a270bfbf3f45c.exe

  • Size

    770KB

  • MD5

    cf6c56346d93fc10443e9261c797746f

  • SHA1

    1702b84ce180e96d166834cdbd83ed71a8f16aea

  • SHA256

    98a0baed911fcca09a50dd4dc17f6f65edf26cc6d834681b1d2a270bfbf3f45c

  • SHA512

    228f275ea0c886ae74ecea22eca47535998c4d69284348db110f699a368d971ad7a16f8aa3b1fdfea98866082d8bfdf8fe144bc4ebea26d32a42d062d6fe30dd

  • SSDEEP

    12288:U5Vko2KEJCq7MD0WnFTXQ0ixKIQK+uBLcnC76n1lT2L5m3bVpHlEkOi5:7JJH7+FnVCQL+LW5LT21m37HlEnG

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

p0t9

Decoy

marketplacewins.com

boymeetsmilf.com

ruhuplus.com

adultescortnft.com

app683.icu

viade.store

businesscardadvertiser.com

5649tk.com

daoguo456.com

digitalservice.pro

muabannothienuy.com

geneseeampwyoming.com

olliejay00.com

pristineintegrity.info

jimdeyux0kopgnhsldig.club

eadsscale.club

iwelim.space

s29x.club

brysonhajee.com

trainership.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3436
    • C:\Users\Admin\AppData\Local\Temp\98a0baed911fcca09a50dd4dc17f6f65edf26cc6d834681b1d2a270bfbf3f45c.exe
      "C:\Users\Admin\AppData\Local\Temp\98a0baed911fcca09a50dd4dc17f6f65edf26cc6d834681b1d2a270bfbf3f45c.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1692
    • C:\Windows\SysWOW64\WWAHost.exe
      "C:\Windows\SysWOW64\WWAHost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1692-10-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1692-15-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1692-16-0x0000000001570000-0x0000000001584000-memory.dmp

    Filesize

    80KB

  • memory/1692-13-0x00000000015A0000-0x00000000018EA000-memory.dmp

    Filesize

    3.3MB

  • memory/1868-5-0x00000000744DE000-0x00000000744DF000-memory.dmp

    Filesize

    4KB

  • memory/1868-2-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/1868-6-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/1868-7-0x0000000005610000-0x00000000056AC000-memory.dmp

    Filesize

    624KB

  • memory/1868-8-0x0000000005A60000-0x0000000005B14000-memory.dmp

    Filesize

    720KB

  • memory/1868-9-0x00000000057D0000-0x0000000005804000-memory.dmp

    Filesize

    208KB

  • memory/1868-4-0x00000000052D0000-0x0000000005362000-memory.dmp

    Filesize

    584KB

  • memory/1868-12-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/1868-3-0x00000000051D0000-0x00000000051DE000-memory.dmp

    Filesize

    56KB

  • memory/1868-0-0x00000000744DE000-0x00000000744DF000-memory.dmp

    Filesize

    4KB

  • memory/1868-1-0x0000000000660000-0x0000000000726000-memory.dmp

    Filesize

    792KB

  • memory/2908-18-0x0000000000420000-0x00000000004FC000-memory.dmp

    Filesize

    880KB

  • memory/2908-20-0x0000000000420000-0x00000000004FC000-memory.dmp

    Filesize

    880KB

  • memory/2908-21-0x0000000000180000-0x00000000001AF000-memory.dmp

    Filesize

    188KB

  • memory/3436-17-0x0000000002C20000-0x0000000002D73000-memory.dmp

    Filesize

    1.3MB

  • memory/3436-22-0x0000000002C20000-0x0000000002D73000-memory.dmp

    Filesize

    1.3MB

  • memory/3436-26-0x0000000007F90000-0x0000000008045000-memory.dmp

    Filesize

    724KB

  • memory/3436-27-0x0000000007F90000-0x0000000008045000-memory.dmp

    Filesize

    724KB

  • memory/3436-29-0x0000000007F90000-0x0000000008045000-memory.dmp

    Filesize

    724KB