Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2024 22:48

General

  • Target

    formbook.exe

  • Size

    181KB

  • MD5

    93918c623317234901e5846540f3a43d

  • SHA1

    a5b49aea492de5430b09fa6c1e07a43a28c92b9d

  • SHA256

    8b23c3ddd235c8708c47bf3eec883a6f8ec12656680648400cb4733d9a14e762

  • SHA512

    c85af20af3aaabc9dd0e7da5b6dabb923d02c29360b8edd9ce31199311b9723f59a5ba13cf344f5891f4a691f6759954de11c12c5005cc80a9eb87567c274153

  • SSDEEP

    3072:TDhzK7wjZWfpsOjxl47KVrK6IUxg2ELN/pP8tGzb4JHg:fhEwYNxy7erK6IUhCt2kzb4JH

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ga4

Decoy

rivercitygoldens.com

seattlebarkery.com

jxsxdb.com

bet365o1.com

mynexthomedfw.com

scheduleyourintentions.com

vestingfacts.com

angelicasanchezpsicologa.com

constructorariedel.com

myabron.com

askthepotato.com

cuscases.com

dlrioata.com

ilikecircles.com

teamsters401kupsplan.com

79dzb.com

simoneventpros.com

cloversonglyrics.com

intansuper.com

gamefacesydney.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\Users\Admin\AppData\Local\Temp\formbook.exe
      "C:\Users\Admin\AppData\Local\Temp\formbook.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:412
    • C:\Windows\SysWOW64\mstsc.exe
      "C:\Windows\SysWOW64\mstsc.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4416
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\formbook.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/412-0-0x0000000001660000-0x00000000019AA000-memory.dmp

    Filesize

    3.3MB

  • memory/412-2-0x0000000000FA0000-0x0000000000FCE000-memory.dmp

    Filesize

    184KB

  • memory/412-1-0x0000000000FBE000-0x0000000000FBF000-memory.dmp

    Filesize

    4KB

  • memory/3448-3-0x0000000002D20000-0x0000000002E48000-memory.dmp

    Filesize

    1.2MB

  • memory/3448-7-0x0000000002D20000-0x0000000002E48000-memory.dmp

    Filesize

    1.2MB

  • memory/3448-11-0x00000000030F0000-0x000000000318D000-memory.dmp

    Filesize

    628KB

  • memory/3448-12-0x00000000030F0000-0x000000000318D000-memory.dmp

    Filesize

    628KB

  • memory/3448-14-0x00000000030F0000-0x000000000318D000-memory.dmp

    Filesize

    628KB

  • memory/4416-4-0x0000000000760000-0x000000000089A000-memory.dmp

    Filesize

    1.2MB

  • memory/4416-6-0x0000000000760000-0x000000000089A000-memory.dmp

    Filesize

    1.2MB