Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2024 02:39

General

  • Target

    2220944d9985a6843374f41b835a9825.msi

  • Size

    272KB

  • MD5

    2220944d9985a6843374f41b835a9825

  • SHA1

    1929c4c64ea4cc18608eaf6140d1b28fa98d7ed3

  • SHA256

    3d5d3eb3853ff82697da75cf6da041f61f72e06d686010a02d52ebaa63ddca65

  • SHA512

    f1ec6f41d5b9ed14885df6e090a77b06c10f2e61ed36525dfd4e953a61c948da8271c2ea5e29dd5fcdba62e2acc218e74b71312e3ef30c54a87b387534e2c816

  • SSDEEP

    6144:5EtTqjFaFtV9KoA68Atd/Tdle0U0gCKTkn9om07/6s2eD5HG:5E9fN26ZtLlDGCos9ofis2gH

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

thl4

Decoy

281155oo.com

ykszyx.com

carhiredurban.com

aualiaison.com

papuapod.com

indianapolisheatingair.com

astoriakrd.online

tiffanyandzach.com

thenextstepos.com

greenleaveshotels.com

opatijatourism.com

greenberg.realestate

coastallasercharleston.com

maximgroupbd.com

one1.agency

gzlckz.com

brittanyreevesmusic.com

login.bid

juliettebrederode.com

stranded.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\2220944d9985a6843374f41b835a9825.msi
      2⤵
      • Enumerates connected drives
      • Event Triggered Execution: Installer Packages
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:804
    • C:\Windows\SysWOW64\systray.exe
      "C:\Windows\SysWOW64\systray.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Installer\MSIC583.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1532
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\Installer\MSIC583.tmp
      "C:\Windows\Installer\MSIC583.tmp"
      2⤵
      • Suspicious use of SetThreadContext
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\Installer\MSIC583.tmp
        "C:\Windows\Installer\MSIC583.tmp"
        3⤵
        • Suspicious use of SetThreadContext
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1400
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1976
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004BC" "00000000000003EC"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76c49b.rbs

    Filesize

    649B

    MD5

    f73b223b194c8968b5b57813afc9ad39

    SHA1

    55d95454e06ba965ce2ddfbf9295931ce660f641

    SHA256

    2d27d5cf4f3643bf7d6891608cf366c33deb5b761ccea9f3a7d7b2db0cfda30d

    SHA512

    dcdadbe0ad2eadeffd0f4dbe4004ede69ec6df7eb4ca21e1481a8c6d28183a3ee777348d55310e3b4c550fc855c91899cccb213907054d0bad59ac65c645cecf

  • C:\Windows\Installer\MSIC583.tmp

    Filesize

    245KB

    MD5

    4613cbcf3184897a7dcfbe0569303863

    SHA1

    9b2f4c444cfbb5914299c7f44d867c1dcdf8c7cc

    SHA256

    b6845befbaf2db54214bf388d650636f2ea251289131751f1735779007ea2334

    SHA512

    906f4f5fb0af20d5471d4f01ed6ecff952153ee355bc252d4d206b9f5e6f97db8b5df83d5e0a5fb56fd38bf117f44bb60a419873a370f3392fe3ae2ba5a40dcd

  • \Users\Admin\AppData\Local\Temp\nstC5C1.tmp\System.dll

    Filesize

    10KB

    MD5

    56a321bd011112ec5d8a32b2f6fd3231

    SHA1

    df20e3a35a1636de64df5290ae5e4e7572447f78

    SHA256

    bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

    SHA512

    5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

  • memory/1272-41-0x0000000003F30000-0x0000000004130000-memory.dmp

    Filesize

    2.0MB

  • memory/1272-45-0x0000000007500000-0x0000000007675000-memory.dmp

    Filesize

    1.5MB

  • memory/1400-25-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1400-38-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2872-40-0x00000000006A0000-0x00000000006A5000-memory.dmp

    Filesize

    20KB