Analysis

  • max time kernel
    148s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2024 23:31

General

  • Target

    Report and Contract.rtf

  • Size

    2.8MB

  • MD5

    2020683c0740feb8c7a41ea70377b7fc

  • SHA1

    326a0155051677653084e841125984b63b30666a

  • SHA256

    3a0b5b12f26a4751964e2660ee62d20b192e00a044cd322f6867acfa25e341bc

  • SHA512

    b550381f4874e6d0d5d8e7af708f4f122aacbcc1b29fbd7dd528751166591458f1bf2fc725714b2a771cd430a8a02a99999df4a5fa4ee3f277137f2bf7263431

  • SSDEEP

    24576:l0wKl7r3ezbhrC+1J5nbVlvTagtZwAQd5CTkY7PGfk/sGvidzy5AghAoDmqaepIn:O

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

c23e

Decoy

chandu4u.com

jeniusbank.co.uk

electricridesboise.com

streetbriefs.com

mdcsweb.com

czsaj.com

hikz.net

vcel.co.uk

cosmeticsz.com

nickatkeson.com

nilas.fr

goodstaygetaway.co.uk

591easy.net

kryptonapps.com

heveany.com

londonphotoworkshops.co.uk

quique.website

cointwovte.com

foodmie.com

silverdropsofficial.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Formbook payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:300
      • C:\Windows\SysWOW64\notepad.exe
        C:\Windows\SysWOW64\notepad.exe /Processid:{0689A6C8-CA97-4357-8D1A-84C69E3E0DDD}
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2432
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1236
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Report and Contract.rtf"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          3⤵
            PID:2768
        • C:\Windows\SysWOW64\cmstp.exe
          "C:\Windows\SysWOW64\cmstp.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2940
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Windows\SysWOW64\notepad.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2844
      • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
        1⤵
        • System Location Discovery: System Language Discovery
        • Launches Equation Editor
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Windows\SysWOW64\CmD.exe
          CmD.exe /C %tmp%\Client.exe A C
          2⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2096
          • C:\Users\Admin\AppData\Local\Temp\Client.exe
            C:\Users\Admin\AppData\Local\Temp\Client.exe A C
            3⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2864

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Client.exe

        Filesize

        967KB

        MD5

        9c34362093560a7ad77eb5dd9af9b3ad

        SHA1

        77aefb3928bbefc174ac437e59cc98ded796ba5e

        SHA256

        26360323d6dfa0a549cd418f1f276e46213360439d6cb784abce4234fdcc2863

        SHA512

        1fde2d5a99584f2f236199bc2e8f52db6405c1740c9bbe6dcaebb78a148c5a086dc8d4f3d0fb80bad2f2b7c0b91d3f2c59ec5ee04c7664a0677afd978af1b8f9

      • memory/1236-17-0x0000000003BE0000-0x0000000003CE0000-memory.dmp

        Filesize

        1024KB

      • memory/1236-26-0x0000000007C80000-0x0000000007DEF000-memory.dmp

        Filesize

        1.4MB

      • memory/2156-0-0x000000002FC81000-0x000000002FC82000-memory.dmp

        Filesize

        4KB

      • memory/2156-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2156-2-0x0000000070FFD000-0x0000000071008000-memory.dmp

        Filesize

        44KB

      • memory/2156-21-0x0000000070FFD000-0x0000000071008000-memory.dmp

        Filesize

        44KB

      • memory/2432-10-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2432-11-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2864-9-0x0000000000A60000-0x0000000000B5C000-memory.dmp

        Filesize

        1008KB

      • memory/2940-18-0x0000000000E70000-0x0000000000E88000-memory.dmp

        Filesize

        96KB

      • memory/2940-19-0x0000000000090000-0x00000000000BF000-memory.dmp

        Filesize

        188KB