Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 16:08

General

  • Target

    eAdvice.exe

  • Size

    803KB

  • MD5

    374dfcd12791782c9f84b3dd72c47029

  • SHA1

    5462c5daac3985aea3e1dff59f055183a62d9065

  • SHA256

    89743e19eb7f977dab3591eda342ac51cead1a15829028a151359e845c10a255

  • SHA512

    813de7f1e6fb3bfbcdb40d09bef3161882356f9a786e53206ed17d6e12cd2b5f2615ec619d1de850b994b857285971f03dfc59282b81e5a53eed7fed8db25186

  • SSDEEP

    24576:7azjP6+z+2fNzDFnGNsveawUNXit980Ipulg:+XNFnFnGNsvvli980I

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

hx303

Decoy

pureommassage.com

tazo.ltd

zixunzd.top

booksmaven.com

307countertops.com

hbfyjc.com

latinamericabridge.info

cannadocbd.com

doriesvariety.store

tineedst.com

zajdshj.com

xnxaxx.com

drjacobpedraza.com

sensationvisuelle.com

termteach.com

ysialerts.com

kblandscapeinc.net

sheetmatters.com

ledfriday.com

urbare.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Users\Admin\AppData\Local\Temp\eAdvice.exe
      "C:\Users\Admin\AppData\Local\Temp\eAdvice.exe"
      2⤵
      • Looks for VirtualBox Guest Additions in registry
      • Looks for VMWare Tools registry key
      • Checks BIOS information in registry
      • Maps connected drives based on registry
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3816
      • C:\Users\Admin\AppData\Local\Temp\eAdvice.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4764
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3688
      • C:\Windows\SysWOW64\cmd.exe
        /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2364
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:3856

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\DB1

      Filesize

      40KB

      MD5

      a182561a527f929489bf4b8f74f65cd7

      SHA1

      8cd6866594759711ea1836e86a5b7ca64ee8911f

      SHA256

      42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

      SHA512

      9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

    • C:\Users\Admin\AppData\Roaming\8Q4OOU81\8Q4logim.jpeg

      Filesize

      87KB

      MD5

      f0bdac35453b85f4123b87f4b82d03ac

      SHA1

      a8be934d0088c4331408745ebfd3343a07364bc4

      SHA256

      049ada7eec74c51d7e943d55574deed5549366ee71bb14d5ee56e7ec46a5800f

      SHA512

      128f6bc3b60cd79923494454e25253cbbc109966f4e506cc77586d3e7bc157d8a5fafc712b4f21dd50f4e03e8ad2ad284bca72b7bc485581e933db225ac2bdaa

    • C:\Users\Admin\AppData\Roaming\8Q4OOU81\8Q4logrf.ini

      Filesize

      40B

      MD5

      2f245469795b865bdd1b956c23d7893d

      SHA1

      6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

      SHA256

      1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

      SHA512

      909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

    • C:\Users\Admin\AppData\Roaming\8Q4OOU81\8Q4logrg.ini

      Filesize

      38B

      MD5

      4aadf49fed30e4c9b3fe4a3dd6445ebe

      SHA1

      1e332822167c6f351b99615eada2c30a538ff037

      SHA256

      75034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56

      SHA512

      eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945

    • C:\Users\Admin\AppData\Roaming\8Q4OOU81\8Q4logri.ini

      Filesize

      40B

      MD5

      d63a82e5d81e02e399090af26db0b9cb

      SHA1

      91d0014c8f54743bba141fd60c9d963f869d76c9

      SHA256

      eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

      SHA512

      38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

    • C:\Users\Admin\AppData\Roaming\8Q4OOU81\8Q4logrv.ini

      Filesize

      872B

      MD5

      bbc41c78bae6c71e63cb544a6a284d94

      SHA1

      33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a

      SHA256

      ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb

      SHA512

      0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

    • memory/3588-44-0x0000000008E10000-0x0000000008F55000-memory.dmp

      Filesize

      1.3MB

    • memory/3588-43-0x0000000008E10000-0x0000000008F55000-memory.dmp

      Filesize

      1.3MB

    • memory/3588-38-0x0000000004790000-0x0000000004852000-memory.dmp

      Filesize

      776KB

    • memory/3588-20-0x0000000004790000-0x0000000004852000-memory.dmp

      Filesize

      776KB

    • memory/3588-51-0x0000000008E10000-0x0000000008F55000-memory.dmp

      Filesize

      1.3MB

    • memory/3688-23-0x0000000000C20000-0x0000000000C4E000-memory.dmp

      Filesize

      184KB

    • memory/3688-22-0x0000000000E90000-0x0000000000E9A000-memory.dmp

      Filesize

      40KB

    • memory/3688-21-0x0000000000E90000-0x0000000000E9A000-memory.dmp

      Filesize

      40KB

    • memory/3816-8-0x000000007527E000-0x000000007527F000-memory.dmp

      Filesize

      4KB

    • memory/3816-5-0x0000000075270000-0x0000000075A20000-memory.dmp

      Filesize

      7.7MB

    • memory/3816-1-0x0000000000160000-0x0000000000230000-memory.dmp

      Filesize

      832KB

    • memory/3816-2-0x00000000051B0000-0x0000000005754000-memory.dmp

      Filesize

      5.6MB

    • memory/3816-15-0x0000000075270000-0x0000000075A20000-memory.dmp

      Filesize

      7.7MB

    • memory/3816-3-0x0000000004CA0000-0x0000000004D32000-memory.dmp

      Filesize

      584KB

    • memory/3816-12-0x000000000D6B0000-0x000000000D716000-memory.dmp

      Filesize

      408KB

    • memory/3816-11-0x000000000A1C0000-0x000000000A238000-memory.dmp

      Filesize

      480KB

    • memory/3816-10-0x0000000007AC0000-0x0000000007B52000-memory.dmp

      Filesize

      584KB

    • memory/3816-9-0x0000000075270000-0x0000000075A20000-memory.dmp

      Filesize

      7.7MB

    • memory/3816-0-0x000000007527E000-0x000000007527F000-memory.dmp

      Filesize

      4KB

    • memory/3816-7-0x0000000004EC0000-0x0000000004ED2000-memory.dmp

      Filesize

      72KB

    • memory/3816-6-0x0000000007530000-0x00000000075CC000-memory.dmp

      Filesize

      624KB

    • memory/3816-4-0x0000000004C50000-0x0000000004C5A000-memory.dmp

      Filesize

      40KB

    • memory/4764-16-0x0000000001400000-0x000000000174A000-memory.dmp

      Filesize

      3.3MB

    • memory/4764-13-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/4764-18-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/4764-19-0x0000000000E80000-0x0000000000E94000-memory.dmp

      Filesize

      80KB