Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 15:09

General

  • Target

    898119779925cbf127343563ada43028f69dcc47b1a50a8ca5a8b1e5a48455ca.exe

  • Size

    1.0MB

  • MD5

    ac2855184f7d04050f0eda9b69ab3e44

  • SHA1

    073c2d08b6e2816dce26c0684faaf632193dab7c

  • SHA256

    898119779925cbf127343563ada43028f69dcc47b1a50a8ca5a8b1e5a48455ca

  • SHA512

    f2142500b6e1966d739373c0abd5734eb4df749be8f3b12cd90f32631602c78e803a7b19995c8ea0156f9979ae60bde42a96d61c3ee0b515c931e26a5271f54e

  • SSDEEP

    12288:/WHMZAWd1lcAWd1lGGDbTKTxnnaAym1pj+INy/FYJR/A/259nqgxiaUc8+bCfeKs:AIFqF81bpc/6Yu5WwqQ

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

m21d

Decoy

ffewv.com

romarg.investments

icoproject.net

syrexol24.xyz

tyxa0.xyz

worktime.website

oilysquat.sbs

hainihaoxx.top

apimarts.com

agorainvestmentscc.com

happyhorsegear.com

373145.uk

3commerce.net

2561havensdr.info

thesolosearcher.com

gwo888.com

luxefofriend.site

ascendarrays.com

diorbear.com

newsforthecolumbiagorge.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3444
      • C:\Users\Admin\AppData\Local\Temp\898119779925cbf127343563ada43028f69dcc47b1a50a8ca5a8b1e5a48455ca.exe
        "C:\Users\Admin\AppData\Local\Temp\898119779925cbf127343563ada43028f69dcc47b1a50a8ca5a8b1e5a48455ca.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4080
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UwhcoNQrvtG" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDC85.tmp"
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:628
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "{path}"
          3⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:816
          • C:\Windows\SysWOW64\NETSTAT.EXE
            "C:\Windows\SysWOW64\NETSTAT.EXE"
            4⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Gathers network information
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:464
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2880
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:2580
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:1376
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:552
            • C:\Windows\SysWOW64\autochk.exe
              "C:\Windows\SysWOW64\autochk.exe"
              2⤵
                PID:1652
              • C:\Windows\SysWOW64\autochk.exe
                "C:\Windows\SysWOW64\autochk.exe"
                2⤵
                  PID:1244
                • C:\Windows\SysWOW64\autochk.exe
                  "C:\Windows\SysWOW64\autochk.exe"
                  2⤵
                    PID:4240
                  • C:\Windows\SysWOW64\autochk.exe
                    "C:\Windows\SysWOW64\autochk.exe"
                    2⤵
                      PID:4220

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\tmpDC85.tmp

                    Filesize

                    1KB

                    MD5

                    807ab98d282f52df74db88b0d218d3ac

                    SHA1

                    50c175605b6e68452db52dea7869f5ed7487b48c

                    SHA256

                    f2758090dc5bed5cf940ee67af2a81e6a0ad7066fc3ea5316fd691fd5e7f0665

                    SHA512

                    3ad6a237e61372215f588252fd8145a861aeb8c80bddac4660911e357b60267d41b1956b954595d03fed02b5ab2a5b7ef62312f8086059fe5669cd8e194c1202

                  • memory/464-31-0x0000000001000000-0x000000000102F000-memory.dmp

                    Filesize

                    188KB

                  • memory/464-29-0x00000000004B0000-0x00000000004BB000-memory.dmp

                    Filesize

                    44KB

                  • memory/464-28-0x00000000004B0000-0x00000000004BB000-memory.dmp

                    Filesize

                    44KB

                  • memory/816-24-0x0000000000400000-0x000000000042F000-memory.dmp

                    Filesize

                    188KB

                  • memory/816-20-0x0000000000400000-0x000000000042F000-memory.dmp

                    Filesize

                    188KB

                  • memory/816-25-0x0000000001470000-0x0000000001485000-memory.dmp

                    Filesize

                    84KB

                  • memory/816-15-0x0000000000400000-0x000000000042F000-memory.dmp

                    Filesize

                    188KB

                  • memory/816-18-0x0000000000F90000-0x00000000012DA000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/816-21-0x0000000000F30000-0x0000000000F45000-memory.dmp

                    Filesize

                    84KB

                  • memory/3444-26-0x0000000008440000-0x00000000085E0000-memory.dmp

                    Filesize

                    1.6MB

                  • memory/3444-35-0x0000000008B90000-0x0000000008CF8000-memory.dmp

                    Filesize

                    1.4MB

                  • memory/3444-34-0x0000000008B90000-0x0000000008CF8000-memory.dmp

                    Filesize

                    1.4MB

                  • memory/3444-30-0x0000000008440000-0x00000000085E0000-memory.dmp

                    Filesize

                    1.6MB

                  • memory/3444-27-0x0000000002790000-0x00000000028F6000-memory.dmp

                    Filesize

                    1.4MB

                  • memory/3444-37-0x0000000008B90000-0x0000000008CF8000-memory.dmp

                    Filesize

                    1.4MB

                  • memory/3444-22-0x0000000002790000-0x00000000028F6000-memory.dmp

                    Filesize

                    1.4MB

                  • memory/4080-7-0x00000000058F0000-0x00000000058FA000-memory.dmp

                    Filesize

                    40KB

                  • memory/4080-17-0x0000000074DF0000-0x00000000755A0000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/4080-11-0x0000000009AF0000-0x0000000009B24000-memory.dmp

                    Filesize

                    208KB

                  • memory/4080-10-0x00000000075B0000-0x0000000007636000-memory.dmp

                    Filesize

                    536KB

                  • memory/4080-9-0x0000000074DF0000-0x00000000755A0000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/4080-8-0x0000000074DFE000-0x0000000074DFF000-memory.dmp

                    Filesize

                    4KB

                  • memory/4080-0-0x0000000074DFE000-0x0000000074DFF000-memory.dmp

                    Filesize

                    4KB

                  • memory/4080-6-0x0000000005260000-0x000000000526A000-memory.dmp

                    Filesize

                    40KB

                  • memory/4080-5-0x0000000074DF0000-0x00000000755A0000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/4080-4-0x0000000005360000-0x00000000053FC000-memory.dmp

                    Filesize

                    624KB

                  • memory/4080-3-0x0000000005270000-0x0000000005302000-memory.dmp

                    Filesize

                    584KB

                  • memory/4080-2-0x0000000005910000-0x0000000005EB4000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/4080-1-0x0000000000750000-0x0000000000862000-memory.dmp

                    Filesize

                    1.1MB