Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 21:23

General

  • Target

    8c218c09f446a0db7b5de9bad9aadf285e81b04673a2db6769ccad09e1e6945b.exe

  • Size

    392KB

  • MD5

    abf477b0f1f223cc754772ea47bdaa44

  • SHA1

    c58595a2b39e58436ed35f887e7b230f436967af

  • SHA256

    8c218c09f446a0db7b5de9bad9aadf285e81b04673a2db6769ccad09e1e6945b

  • SHA512

    2af086a54a6d3384ad1e6633bc525c8a6c74b07e2133d83ce0cb67eb80ccd73a2a65127e1f182ea935ef570b8bcc9420370153071d95f711a966b362748ffaef

  • SSDEEP

    6144:Z9O8QFXPDBvcPvbOtnLa1JnTajynM1QqZVVJ+rssBEueQk:vPQncPaEWF1xZTYrWh

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ey5a

Decoy

lygptkl.com

winsentrade.com

bluprintliving.com

yumohealth.com

cherryadulttoys.com

gianttigar.com

maxhutmacher.net

autostokyocorp.com

calvaryload.com

stixxiepix.com

j98152.com

starsky666.xyz

loadkicks.com

designauraspace.com

wwwfmcna.com

mikakonaitopsychologist.com

kristalsuaritma.com

kh180.com

kulturel.net

araveenapark.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c218c09f446a0db7b5de9bad9aadf285e81b04673a2db6769ccad09e1e6945b.exe
    "C:\Users\Admin\AppData\Local\Temp\8c218c09f446a0db7b5de9bad9aadf285e81b04673a2db6769ccad09e1e6945b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4420
    • C:\Users\Admin\AppData\Local\Temp\8c218c09f446a0db7b5de9bad9aadf285e81b04673a2db6769ccad09e1e6945b.exe
      "C:\Users\Admin\AppData\Local\Temp\8c218c09f446a0db7b5de9bad9aadf285e81b04673a2db6769ccad09e1e6945b.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4392-11-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4392-15-0x0000000001A60000-0x0000000001DAA000-memory.dmp

    Filesize

    3.3MB

  • memory/4392-14-0x0000000001A60000-0x0000000001DAA000-memory.dmp

    Filesize

    3.3MB

  • memory/4420-6-0x0000000005250000-0x000000000525C000-memory.dmp

    Filesize

    48KB

  • memory/4420-4-0x0000000074A70000-0x0000000075220000-memory.dmp

    Filesize

    7.7MB

  • memory/4420-5-0x0000000004E60000-0x0000000004E6A000-memory.dmp

    Filesize

    40KB

  • memory/4420-0-0x0000000074A7E000-0x0000000074A7F000-memory.dmp

    Filesize

    4KB

  • memory/4420-7-0x0000000074A7E000-0x0000000074A7F000-memory.dmp

    Filesize

    4KB

  • memory/4420-8-0x0000000074A70000-0x0000000075220000-memory.dmp

    Filesize

    7.7MB

  • memory/4420-9-0x0000000006850000-0x00000000068EC000-memory.dmp

    Filesize

    624KB

  • memory/4420-10-0x00000000069A0000-0x00000000069F8000-memory.dmp

    Filesize

    352KB

  • memory/4420-3-0x0000000004EE0000-0x0000000004F72000-memory.dmp

    Filesize

    584KB

  • memory/4420-13-0x0000000074A70000-0x0000000075220000-memory.dmp

    Filesize

    7.7MB

  • memory/4420-2-0x0000000005490000-0x0000000005A34000-memory.dmp

    Filesize

    5.6MB

  • memory/4420-1-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB