Analysis

  • max time kernel
    146s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2024 19:22

General

  • Target

    duzcazams.exe

  • Size

    133KB

  • MD5

    9cc4b3dcc8a712968339507dfbefa5bc

  • SHA1

    5909f209cf93e4365180ac050d663a2076e81af8

  • SHA256

    3017920f6f2c95870bf938c2aab1c64e77c9b65e7f8ad7e3d81cdaeb58bacff3

  • SHA512

    c5f5955302883578f4899f9250984bcedc375a7f2c1b3e1dd3912a1e334c8f247df757cb94a4ac8ed94918659b22f0070172dfbe0dc9fe567fece22a7b34364e

  • SSDEEP

    3072:5DCsPEvMCi32nCnQCqTJhtvjRwDOAa00LSAQzM3JDH:Z9PkKuDTJrFwD5eH

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

sy01

Decoy

aeria.life

jotted.community

mozarspalace.com

bfkoxoih.work

doganmuzik.com

ljsq.shop

vitalitycook.store

74574575.xyz

infiniteuniverse.site

storkrv.com

amendmentsymmetrical.top

adevodigital.com

renammsac.com

tptretry.info

ninfainacquerello.com

25038.top

httpsthothub.lol

yvxbt.com

72028.top

vzxtopi.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\duzcazams.exe
      "C:\Users\Admin\AppData\Local\Temp\duzcazams.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Users\Admin\AppData\Local\Temp\duzcazams.exe
        "C:\Users\Admin\AppData\Local\Temp\duzcazams.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3000
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\duzcazams.exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:1644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1200-5-0x0000000004D90000-0x0000000004F2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1200-10-0x0000000004D90000-0x0000000004F2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1200-15-0x0000000004F30000-0x000000000507E000-memory.dmp

    Filesize

    1.3MB

  • memory/1200-16-0x0000000004F30000-0x000000000507E000-memory.dmp

    Filesize

    1.3MB

  • memory/1200-18-0x0000000004F30000-0x000000000507E000-memory.dmp

    Filesize

    1.3MB

  • memory/2380-0-0x0000000000090000-0x0000000000092000-memory.dmp

    Filesize

    8KB

  • memory/3000-2-0x0000000000B20000-0x0000000000E23000-memory.dmp

    Filesize

    3.0MB

  • memory/3000-4-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3000-3-0x000000000041F000-0x0000000000420000-memory.dmp

    Filesize

    4KB

  • memory/3068-7-0x00000000008E0000-0x00000000009D4000-memory.dmp

    Filesize

    976KB

  • memory/3068-8-0x00000000008E0000-0x00000000009D4000-memory.dmp

    Filesize

    976KB

  • memory/3068-9-0x00000000000C0000-0x00000000000EF000-memory.dmp

    Filesize

    188KB