Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-12-2024 01:44

General

  • Target

    a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe

  • Size

    1.0MB

  • MD5

    2cf26b9ca6de978134bf34e881525e73

  • SHA1

    3f31fde180f01c1f2cf4976f38f6e142268feb92

  • SHA256

    a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2

  • SHA512

    99c306ce84c9bec9a27a275a514597a0e1773059357e41105c0f769365666c7298bcbb5038a45492975cfb3ee2965e057b30b63243af911f3ded03089cf6b84d

  • SSDEEP

    24576:lqco14WIVkJPj6Yhk5Ue0uO0gAELPvLvpSf:lqrGt+JWYhk5Ue0uO0gvr

Malware Config

Extracted

Family

formbook

Campaign

scr3

Decoy

IHJ9JVzAYK2EdGsB8Q==

tQQl6U7e5rfQ8KVIH41w+Ic=

FYieRjtFwhOhFFSvVIpQ4A==

jKzNCXBNZCpMdnVKatuN75g=

i3wz0asEojI0KuzYp62sFM46UQ==

+iRIHQcTwlOWHYJM/T+p

6JREbp/z4sLyDvm6o+Y=

ydTX2x/IbuLKFF2xYR21

ouHaYURXoZ4tl1L48w==

wR1dgL2/bcttD0jXvGz6LPAY7VzIJrY2Pw==

FGKSZFtrGYYVffi4Qi+596QMmWSffQ==

DBsYMHBNyDPhjzbtq1bmGcYJ1oSs

RJfO+Sz4BOOszYAh

zqxB4ctdj5LoqXhh+w==

WQSNj7gOui405jUyP6Fe0r2yhAg=

iLTDyCL/HR5tVfm6o+Y=

fiq4ygBd+0nXWpkGCwPKXEF+gQI=

2m+ubVwwh0HfKw==

KlJtjJj0jAkT0Dc0Cymh2L2yhAg=

SqLAZpjhRaSrYIJVKTCy4g==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe
    "C:\Users\Admin\AppData\Local\Temp\a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe
      "C:\Users\Admin\AppData\Local\Temp\a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1964-8-0x0000000073F10000-0x00000000745FE000-memory.dmp

    Filesize

    6.9MB

  • memory/1964-4-0x0000000073F1E000-0x0000000073F1F000-memory.dmp

    Filesize

    4KB

  • memory/1964-0-0x0000000073F1E000-0x0000000073F1F000-memory.dmp

    Filesize

    4KB

  • memory/1964-3-0x00000000003E0000-0x00000000003F4000-memory.dmp

    Filesize

    80KB

  • memory/1964-9-0x0000000004490000-0x00000000044FC000-memory.dmp

    Filesize

    432KB

  • memory/1964-5-0x0000000073F10000-0x00000000745FE000-memory.dmp

    Filesize

    6.9MB

  • memory/1964-6-0x0000000000550000-0x000000000055C000-memory.dmp

    Filesize

    48KB

  • memory/1964-16-0x0000000073F10000-0x00000000745FE000-memory.dmp

    Filesize

    6.9MB

  • memory/1964-2-0x0000000073F10000-0x00000000745FE000-memory.dmp

    Filesize

    6.9MB

  • memory/1964-1-0x0000000000E30000-0x0000000000F3A000-memory.dmp

    Filesize

    1.0MB

  • memory/1964-7-0x00000000080D0000-0x0000000008194000-memory.dmp

    Filesize

    784KB

  • memory/2568-14-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2568-17-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2568-10-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2568-11-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2568-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2568-18-0x0000000000830000-0x0000000000B33000-memory.dmp

    Filesize

    3.0MB