Analysis

  • max time kernel
    94s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-12-2024 01:44

General

  • Target

    a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe

  • Size

    1.0MB

  • MD5

    2cf26b9ca6de978134bf34e881525e73

  • SHA1

    3f31fde180f01c1f2cf4976f38f6e142268feb92

  • SHA256

    a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2

  • SHA512

    99c306ce84c9bec9a27a275a514597a0e1773059357e41105c0f769365666c7298bcbb5038a45492975cfb3ee2965e057b30b63243af911f3ded03089cf6b84d

  • SSDEEP

    24576:lqco14WIVkJPj6Yhk5Ue0uO0gAELPvLvpSf:lqrGt+JWYhk5Ue0uO0gvr

Malware Config

Extracted

Family

formbook

Campaign

scr3

Decoy

IHJ9JVzAYK2EdGsB8Q==

tQQl6U7e5rfQ8KVIH41w+Ic=

FYieRjtFwhOhFFSvVIpQ4A==

jKzNCXBNZCpMdnVKatuN75g=

i3wz0asEojI0KuzYp62sFM46UQ==

+iRIHQcTwlOWHYJM/T+p

6JREbp/z4sLyDvm6o+Y=

ydTX2x/IbuLKFF2xYR21

ouHaYURXoZ4tl1L48w==

wR1dgL2/bcttD0jXvGz6LPAY7VzIJrY2Pw==

FGKSZFtrGYYVffi4Qi+596QMmWSffQ==

DBsYMHBNyDPhjzbtq1bmGcYJ1oSs

RJfO+Sz4BOOszYAh

zqxB4ctdj5LoqXhh+w==

WQSNj7gOui405jUyP6Fe0r2yhAg=

iLTDyCL/HR5tVfm6o+Y=

fiq4ygBd+0nXWpkGCwPKXEF+gQI=

2m+ubVwwh0HfKw==

KlJtjJj0jAkT0Dc0Cymh2L2yhAg=

SqLAZpjhRaSrYIJVKTCy4g==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe
    "C:\Users\Admin\AppData\Local\Temp\a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Users\Admin\AppData\Local\Temp\a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe
      "C:\Users\Admin\AppData\Local\Temp\a0bbdef47b7dbb6df230758ba5021e2ae60acf37de54d987681c503828dd84d2.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/636-8-0x0000000074CB0000-0x0000000075460000-memory.dmp

    Filesize

    7.7MB

  • memory/636-2-0x0000000005610000-0x0000000005BB4000-memory.dmp

    Filesize

    5.6MB

  • memory/636-9-0x0000000006540000-0x000000000654C000-memory.dmp

    Filesize

    48KB

  • memory/636-10-0x00000000067B0000-0x0000000006874000-memory.dmp

    Filesize

    784KB

  • memory/636-4-0x00000000050E0000-0x00000000050EA000-memory.dmp

    Filesize

    40KB

  • memory/636-5-0x0000000074CB0000-0x0000000075460000-memory.dmp

    Filesize

    7.7MB

  • memory/636-6-0x0000000006530000-0x0000000006544000-memory.dmp

    Filesize

    80KB

  • memory/636-7-0x0000000074CBE000-0x0000000074CBF000-memory.dmp

    Filesize

    4KB

  • memory/636-0-0x0000000074CBE000-0x0000000074CBF000-memory.dmp

    Filesize

    4KB

  • memory/636-1-0x0000000000710000-0x000000000081A000-memory.dmp

    Filesize

    1.0MB

  • memory/636-3-0x0000000005100000-0x0000000005192000-memory.dmp

    Filesize

    584KB

  • memory/636-11-0x00000000082C0000-0x000000000835C000-memory.dmp

    Filesize

    624KB

  • memory/636-12-0x00000000083D0000-0x0000000008436000-memory.dmp

    Filesize

    408KB

  • memory/636-13-0x00000000085A0000-0x000000000860C000-memory.dmp

    Filesize

    432KB

  • memory/636-18-0x0000000074CB0000-0x0000000075460000-memory.dmp

    Filesize

    7.7MB

  • memory/4588-14-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4588-17-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4588-19-0x0000000001830000-0x0000000001B7A000-memory.dmp

    Filesize

    3.3MB