Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2024 23:50

General

  • Target

    b7ab1380649d7f31d577bd69980baf9d97274c95fab12936befd6c3aa12b7fc3.exe

  • Size

    734KB

  • MD5

    9c742946914ed5e32ddd328e3d6419b9

  • SHA1

    c59521d2681504beed0a5a692119471ef3cd5643

  • SHA256

    b7ab1380649d7f31d577bd69980baf9d97274c95fab12936befd6c3aa12b7fc3

  • SHA512

    b0e88c7ab34a34574ef6c688c703b03e4744ba1fb8edb2bda488dab920b892223d39dfab41f4828772dcec4ed5a2ad6000de55437f77285347fc980e9f6786f7

  • SSDEEP

    6144:Z2WvsajJQNh2B0B66GfLIG51eHmNIRT0yPluQaGgZdbCSj2Z152TnsU9OrXLRxIl:x4A0B7ysmOT/luwgZ1iZ1Ks9rRtaiK

Malware Config

Extracted

Family

formbook

Campaign

cqd8

Decoy

9zPItsSBQPthH0B1

iyz2ugC7TUMEaZEDDTNIzw==

uVc25zCFO03zbYzHxXLElk5HHccFoes=

RYDZw1su7yszucXjwqtgrz1tSccFoes=

AiB+KfBdDLRFs8sOAsmAllKZeg==

w5T7/Y1lNGBeMdKkKNl8tUl3fTWjlURG

mcIHqPCaEavSyg==

YA7dyN6xKf1MKJa/RA==

Dt789IRVd/fO8FeQNOiV3g==

jYfu3dS4b/1OL59exnPPEo4=

SjyOSKD6lRhpWwUmMwE8ncB1KOg=

JIT782/TaO41DXw3hYJa1g==

uT4u7SwA+3yA/iCo0O7tHyeffA==

/gJzPfngDySzwndmyHPPEo4=

+Um8wD7b9bCQ8A9cK4Nl1oA=

RaikVqx5ozxW3vd6khgIHsDMgKrv

hyYEyRMIEJ8WdnFePeLgHyeffA==

bCov6raFJ30odm5fJQQ=

1rMMrXrTf7OZqyLVM708wZ0=

U4nspOC6sJ3et2I=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7ab1380649d7f31d577bd69980baf9d97274c95fab12936befd6c3aa12b7fc3.exe
    "C:\Users\Admin\AppData\Local\Temp\b7ab1380649d7f31d577bd69980baf9d97274c95fab12936befd6c3aa12b7fc3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3896
    • C:\Users\Admin\AppData\Local\Temp\b7ab1380649d7f31d577bd69980baf9d97274c95fab12936befd6c3aa12b7fc3.exe
      "C:\Users\Admin\AppData\Local\Temp\b7ab1380649d7f31d577bd69980baf9d97274c95fab12936befd6c3aa12b7fc3.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3896-8-0x0000000074BB0000-0x0000000075360000-memory.dmp

    Filesize

    7.7MB

  • memory/3896-2-0x0000000005C60000-0x0000000006204000-memory.dmp

    Filesize

    5.6MB

  • memory/3896-9-0x0000000005C50000-0x0000000005C5C000-memory.dmp

    Filesize

    48KB

  • memory/3896-10-0x0000000006CB0000-0x0000000006D3E000-memory.dmp

    Filesize

    568KB

  • memory/3896-4-0x0000000074BB0000-0x0000000075360000-memory.dmp

    Filesize

    7.7MB

  • memory/3896-5-0x0000000005610000-0x000000000561A000-memory.dmp

    Filesize

    40KB

  • memory/3896-6-0x0000000005C30000-0x0000000005C44000-memory.dmp

    Filesize

    80KB

  • memory/3896-7-0x0000000074BBE000-0x0000000074BBF000-memory.dmp

    Filesize

    4KB

  • memory/3896-0-0x0000000074BBE000-0x0000000074BBF000-memory.dmp

    Filesize

    4KB

  • memory/3896-1-0x0000000000C00000-0x0000000000CBE000-memory.dmp

    Filesize

    760KB

  • memory/3896-3-0x0000000005560000-0x00000000055F2000-memory.dmp

    Filesize

    584KB

  • memory/3896-11-0x0000000006E00000-0x0000000006E9C000-memory.dmp

    Filesize

    624KB

  • memory/3896-12-0x0000000007010000-0x0000000007076000-memory.dmp

    Filesize

    408KB

  • memory/3896-13-0x0000000006DB0000-0x0000000006DE4000-memory.dmp

    Filesize

    208KB

  • memory/3896-18-0x0000000074BB0000-0x0000000075360000-memory.dmp

    Filesize

    7.7MB

  • memory/4140-17-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4140-14-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4140-19-0x0000000001340000-0x000000000168A000-memory.dmp

    Filesize

    3.3MB