Analysis

  • max time kernel
    147s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2024 20:28

General

  • Target

    AWB 456789098765.exe

  • Size

    1.1MB

  • MD5

    b785d60412390b52a6c634366a27eb9a

  • SHA1

    639dfd8be745805a2e5dfa94df0f52050a5683e5

  • SHA256

    08ff2dd59cb681df7b2ac6310a54bfcf990d11b9c7ca3fed51bd043a59e43d52

  • SHA512

    9ca769093d504497cc62cb1ad19025c3355c4ad0436a75a9509c19f3d7c983284a0d0c76cf4244de8df8eb313753aeba55fda2293bfde91a112fb17ab7f7a218

  • SSDEEP

    12288:mj0c41hw4e/ehLrzR08f9aU0gWYkGGn2E1CSiwlMfQqK3NvxmZxg1hw4e/:KL4LJKQ0U0gYn2u9iwrTN0j4

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

na24

Decoy

confabulator.info

pointsante.com

knoxpak.site

mhonl.site

peter-elliot.co.uk

transmetrics.site

dali001.com

graphicimagestattoo.com

nicesparthiae.biz

dteonfgdelsm.xyz

truegoatapparel.net

firtokyshop.xyz

v7op.icu

exunix.com

77seven-s.com

explorevenda.com

a-prime-sellyourhousefast.fyi

jezierzany.com

983488728.com

heliosbot.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\AWB 456789098765.exe
      "C:\Users\Admin\AppData\Local\Temp\AWB 456789098765.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Users\Admin\AppData\Local\Temp\AWB 456789098765.exe
        "C:\Users\Admin\AppData\Local\Temp\AWB 456789098765.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2932
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:2864
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\SysWOW64\cmd.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\AWB 456789098765.exe"
          3⤵
          • Deletes itself
          • System Location Discovery: System Language Discovery
          PID:2756

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1192-19-0x0000000000010000-0x0000000000020000-memory.dmp

      Filesize

      64KB

    • memory/1192-20-0x00000000060C0000-0x000000000625E000-memory.dmp

      Filesize

      1.6MB

    • memory/1192-24-0x00000000060C0000-0x000000000625E000-memory.dmp

      Filesize

      1.6MB

    • memory/2580-8-0x0000000005130000-0x0000000005164000-memory.dmp

      Filesize

      208KB

    • memory/2580-4-0x00000000749FE000-0x00000000749FF000-memory.dmp

      Filesize

      4KB

    • memory/2580-5-0x00000000749F0000-0x00000000750DE000-memory.dmp

      Filesize

      6.9MB

    • memory/2580-6-0x0000000000950000-0x000000000095C000-memory.dmp

      Filesize

      48KB

    • memory/2580-7-0x0000000005D10000-0x0000000005D9E000-memory.dmp

      Filesize

      568KB

    • memory/2580-3-0x0000000000560000-0x000000000057A000-memory.dmp

      Filesize

      104KB

    • memory/2580-2-0x00000000749F0000-0x00000000750DE000-memory.dmp

      Filesize

      6.9MB

    • memory/2580-0-0x00000000749FE000-0x00000000749FF000-memory.dmp

      Filesize

      4KB

    • memory/2580-14-0x00000000749F0000-0x00000000750DE000-memory.dmp

      Filesize

      6.9MB

    • memory/2580-1-0x0000000000D00000-0x0000000000E1C000-memory.dmp

      Filesize

      1.1MB

    • memory/2900-23-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/2900-22-0x000000004A610000-0x000000004A65C000-memory.dmp

      Filesize

      304KB

    • memory/2900-21-0x000000004A610000-0x000000004A65C000-memory.dmp

      Filesize

      304KB

    • memory/2932-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2932-17-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2932-18-0x0000000000350000-0x0000000000364000-memory.dmp

      Filesize

      80KB

    • memory/2932-15-0x0000000000880000-0x0000000000B83000-memory.dmp

      Filesize

      3.0MB

    • memory/2932-9-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2932-10-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2932-13-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB