Analysis

  • max time kernel
    94s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 16:44

General

  • Target

    c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe

  • Size

    1.4MB

  • MD5

    9d2f586afb6c4b2e82e049702948b928

  • SHA1

    38e04f9da21e7c671d2183dc3013dcddddd9aa18

  • SHA256

    c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57

  • SHA512

    8436c64227573862934c3008129dcf09168e43604dde72d2547c63e6a501db8a9834a0170c7855a4044392ed6c4d44cb858a25514342239b7cc376ede0503a0e

  • SSDEEP

    24576:wu6J33O0c+JY5UZ+XC0kGso6FazbJQxGpVs5ia/5qX9cUtFl4u4KYM2WY:6u0c++OCvkGs9FazbJ6r5ia/5Q99FyfP

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

k0d

Decoy

actanoverba.com

karenmckaylegal.com

magiatelier.link

asseto.co.uk

511227.com

friedharf.net

awesomebtc.com

cooperativatci.com

7r62wq4m2c.com

vetswhogetmarketing.com

supramvp.com

reusablecanninglids.net

skygouwu.com

51shengyuan.com

selekamenorezac.com

yt7876.com

haapaniemivalley.com

smlc8.com

transitium.com

dunkflre.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe
    "C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3108
    • C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe
      "C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe"
      2⤵
        PID:3556
      • C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe
        "C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe"
        2⤵
          PID:4316
        • C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe
          "C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe"
          2⤵
            PID:3500
          • C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe
            "C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe"
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4532

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3108-0-0x00000000009D0000-0x0000000000A25000-memory.dmp

          Filesize

          340KB

        • memory/3108-1-0x0000000003880000-0x00000000038D5000-memory.dmp

          Filesize

          340KB

        • memory/4532-2-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/4532-3-0x00000000018C0000-0x0000000001C0A000-memory.dmp

          Filesize

          3.3MB