Analysis

  • max time kernel
    147s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 19:48

General

  • Target

    Invoice confirmation & NEW PO for 2 sets of items.exe

  • Size

    245KB

  • MD5

    f3c9093843cb99abb526c24e5d5cb8b1

  • SHA1

    d63fc0888cee40b90f2dcfb96605b8720b60736e

  • SHA256

    6e71e82dcb056af810baae26909b712ec2dc1610bbf8ebbee00b62f9bb2b3189

  • SHA512

    9169de6e0a4d10c6e25f643bd8763da3e41c9ed75b976dc7e423c2893ca05b5b5cea0560f7bbfb636235f5d1f874a81a417292a1ee995d5e96b187da2b841db7

  • SSDEEP

    6144:sTqjF9xMIMgoQS636xTz6bOrmKOUbAuQ+d:ssxnS63KrRAuQM

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

gbwy

Decoy

fortnitegol.com

damoa.clinic

flifeunite.com

smacey.com

geekflare.host

teachflame.com

moneymakersclub.net

hollstore.com

virtual-box.cloud

electrojagat.com

lucianenergy.com

sagradha.net

bluehatcrypto.com

brandaotec.com

elisabeth-koblitz.com

miamielc-kuwait.com

juicedbikeszendesk.com

artesiansalt.com

avisena.net

homiesexuals.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\Invoice confirmation & NEW PO for 2 sets of items.exe
      "C:\Users\Admin\AppData\Local\Temp\Invoice confirmation & NEW PO for 2 sets of items.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Users\Admin\AppData\Local\Temp\Invoice confirmation & NEW PO for 2 sets of items.exe
        "C:\Users\Admin\AppData\Local\Temp\Invoice confirmation & NEW PO for 2 sets of items.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2984
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\SysWOW64\wscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Invoice confirmation & NEW PO for 2 sets of items.exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsoF78A.tmp\System.dll

    Filesize

    10KB

    MD5

    56a321bd011112ec5d8a32b2f6fd3231

    SHA1

    df20e3a35a1636de64df5290ae5e4e7572447f78

    SHA256

    bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

    SHA512

    5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

  • memory/1192-14-0x00000000036E0000-0x00000000037E0000-memory.dmp

    Filesize

    1024KB

  • memory/1192-15-0x0000000004F00000-0x0000000004FD5000-memory.dmp

    Filesize

    852KB

  • memory/1192-21-0x0000000004F00000-0x0000000004FD5000-memory.dmp

    Filesize

    852KB

  • memory/2820-18-0x0000000000530000-0x0000000000556000-memory.dmp

    Filesize

    152KB

  • memory/2820-20-0x0000000000530000-0x0000000000556000-memory.dmp

    Filesize

    152KB

  • memory/2984-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2984-13-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB