Analysis

  • max time kernel
    148s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2024 15:09

General

  • Target

    898119779925cbf127343563ada43028f69dcc47b1a50a8ca5a8b1e5a48455ca.exe

  • Size

    1.0MB

  • MD5

    ac2855184f7d04050f0eda9b69ab3e44

  • SHA1

    073c2d08b6e2816dce26c0684faaf632193dab7c

  • SHA256

    898119779925cbf127343563ada43028f69dcc47b1a50a8ca5a8b1e5a48455ca

  • SHA512

    f2142500b6e1966d739373c0abd5734eb4df749be8f3b12cd90f32631602c78e803a7b19995c8ea0156f9979ae60bde42a96d61c3ee0b515c931e26a5271f54e

  • SSDEEP

    12288:/WHMZAWd1lcAWd1lGGDbTKTxnnaAym1pj+INy/FYJR/A/259nqgxiaUc8+bCfeKs:AIFqF81bpc/6Yu5WwqQ

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

m21d

Decoy

ffewv.com

romarg.investments

icoproject.net

syrexol24.xyz

tyxa0.xyz

worktime.website

oilysquat.sbs

hainihaoxx.top

apimarts.com

agorainvestmentscc.com

happyhorsegear.com

373145.uk

3commerce.net

2561havensdr.info

thesolosearcher.com

gwo888.com

luxefofriend.site

ascendarrays.com

diorbear.com

newsforthecolumbiagorge.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\898119779925cbf127343563ada43028f69dcc47b1a50a8ca5a8b1e5a48455ca.exe
      "C:\Users\Admin\AppData\Local\Temp\898119779925cbf127343563ada43028f69dcc47b1a50a8ca5a8b1e5a48455ca.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UwhcoNQrvtG" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFDCF.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2796
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2176
    • C:\Windows\SysWOW64\wininit.exe
      "C:\Windows\SysWOW64\wininit.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpFDCF.tmp

    Filesize

    1KB

    MD5

    0d635574e873f104f41aa9d089d21cae

    SHA1

    a70912d8d9947e02ce76a6565c60c087fd03bfa5

    SHA256

    6e174f23a84b9a8f40eec43b93a4899da0343fa06ffa1b6a04bcb546ad09431c

    SHA512

    2f9cbeac0ff57cee442ed16e9442122586c6cc67ef6da6cbe2f4c36ccf8bbde4314399c64834954fbacfe5e457ed7efa02ed49462a9af30dec7b48a193dbc7a2

  • memory/1224-27-0x00000000068C0000-0x0000000006A0A000-memory.dmp

    Filesize

    1.3MB

  • memory/1224-23-0x00000000068C0000-0x0000000006A0A000-memory.dmp

    Filesize

    1.3MB

  • memory/1224-21-0x0000000000360000-0x0000000000460000-memory.dmp

    Filesize

    1024KB

  • memory/2032-5-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/2032-3-0x00000000004B0000-0x00000000004BA000-memory.dmp

    Filesize

    40KB

  • memory/2032-6-0x0000000004F30000-0x0000000004FB6000-memory.dmp

    Filesize

    536KB

  • memory/2032-7-0x00000000007C0000-0x00000000007F4000-memory.dmp

    Filesize

    208KB

  • memory/2032-4-0x000000007408E000-0x000000007408F000-memory.dmp

    Filesize

    4KB

  • memory/2032-0-0x000000007408E000-0x000000007408F000-memory.dmp

    Filesize

    4KB

  • memory/2032-1-0x0000000000150000-0x0000000000262000-memory.dmp

    Filesize

    1.1MB

  • memory/2032-2-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/2032-22-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/2176-11-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2176-12-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2176-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2176-20-0x0000000000190000-0x00000000001A5000-memory.dmp

    Filesize

    84KB

  • memory/2176-19-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2176-17-0x0000000000A20000-0x0000000000D23000-memory.dmp

    Filesize

    3.0MB

  • memory/2176-16-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2884-25-0x00000000000F0000-0x000000000010A000-memory.dmp

    Filesize

    104KB

  • memory/2884-24-0x00000000000F0000-0x000000000010A000-memory.dmp

    Filesize

    104KB

  • memory/2884-26-0x00000000000C0000-0x00000000000EF000-memory.dmp

    Filesize

    188KB