Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2024 02:44

General

  • Target

    PO # 45347212.exe

  • Size

    429KB

  • MD5

    9d83142b0bdb6f149eca4a5724574c0f

  • SHA1

    126271e8e9084d595bdd9ca65a2de20d0568ba7f

  • SHA256

    97349abd1ac7763287f0d08aab708bb4fe8d02989d5454a5f09f68d62b0995e6

  • SHA512

    100ed5689bca3f17fedc3471e9d4802ca3ca7c71a82f46afc46fea8c1818bc6c344f2372ab80b43cc4b23bbbb95cc2ddd5d883eb57ee11f976b15a554e25870f

  • SSDEEP

    12288:XYtsFABgFW4wxoUmzV8O5b3kRc+4OHhInYXm2Pcg:XEBugxoHzVDb3YDMnmcg

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

cx0

Decoy

avtnywveba.club

championmanifesto.com

fuehren.net

smallbusinesshelps.com

langshun168.com

maxonone.com

2commasummit.com

feat.gallery

rgsbc.com

gamefa88vn.pro

dandeliondesignart.com

mksso-real.com

shroomsconnect.com

boscoandthebees.com

payday-loans.space

maryaab-lpc.com

vaaccidentdoctorsnearme.info

ensley1961.com

viilaa.com

paraboliclight.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Formbook payload 3 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Users\Admin\AppData\Local\Temp\PO # 45347212.exe
      "C:\Users\Admin\AppData\Local\Temp\PO # 45347212.exe"
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Looks for VirtualBox Guest Additions in registry
      • Looks for VMWare Tools registry key
      • Checks BIOS information in registry
      • Checks computer location settings
      • Windows security modification
      • Maps connected drives based on registry
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:780
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RQmiqTiKa" /XML "C:\Users\Admin\AppData\Local\Temp\tmp69A2.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:1628
      • C:\Users\Admin\AppData\Local\Temp\PO # 45347212.exe
        "C:\Users\Admin\AppData\Local\Temp\PO # 45347212.exe"
        3⤵
          PID:4652
        • C:\Users\Admin\AppData\Local\Temp\PO # 45347212.exe
          "C:\Users\Admin\AppData\Local\Temp\PO # 45347212.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:3232
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:3384
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:2836
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:4424
            • C:\Windows\SysWOW64\autochk.exe
              "C:\Windows\SysWOW64\autochk.exe"
              2⤵
                PID:820
              • C:\Windows\SysWOW64\autofmt.exe
                "C:\Windows\SysWOW64\autofmt.exe"
                2⤵
                  PID:3956
                • C:\Windows\SysWOW64\autofmt.exe
                  "C:\Windows\SysWOW64\autofmt.exe"
                  2⤵
                    PID:3688
                  • C:\Windows\SysWOW64\autofmt.exe
                    "C:\Windows\SysWOW64\autofmt.exe"
                    2⤵
                      PID:872
                    • C:\Windows\SysWOW64\autofmt.exe
                      "C:\Windows\SysWOW64\autofmt.exe"
                      2⤵
                        PID:2000
                      • C:\Windows\SysWOW64\autofmt.exe
                        "C:\Windows\SysWOW64\autofmt.exe"
                        2⤵
                          PID:4004
                        • C:\Windows\SysWOW64\control.exe
                          "C:\Windows\SysWOW64\control.exe"
                          2⤵
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2004
                          • C:\Windows\SysWOW64\cmd.exe
                            /c del "C:\Users\Admin\AppData\Local\Temp\PO # 45347212.exe"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:4616

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yjw3zhrq.fgy.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\tmp69A2.tmp

                        Filesize

                        1KB

                        MD5

                        d48fdadf452655ff3ddd387b056daf0b

                        SHA1

                        07fd6d81fb7abb9f502eaedb4730fc399df27310

                        SHA256

                        6d707202ed42f4c8678719d7a43cf30da908fc49176f591e92cfb5276c7a8e27

                        SHA512

                        2bf84935a870a5624b17986da6ee1aac03d2e2d6ee1881199e6049ea3640cdf8f8d18cee1276996b4342c8be8017f83fe045a83595dbcc24448276430b6d6c73

                      • memory/780-33-0x0000000074770000-0x0000000074F20000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/780-56-0x0000000007470000-0x0000000007478000-memory.dmp

                        Filesize

                        32KB

                      • memory/780-59-0x0000000074770000-0x0000000074F20000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/780-55-0x0000000007490000-0x00000000074AA000-memory.dmp

                        Filesize

                        104KB

                      • memory/780-44-0x0000000006400000-0x000000000641E000-memory.dmp

                        Filesize

                        120KB

                      • memory/780-54-0x0000000007390000-0x00000000073A4000-memory.dmp

                        Filesize

                        80KB

                      • memory/780-53-0x0000000007380000-0x000000000738E000-memory.dmp

                        Filesize

                        56KB

                      • memory/780-52-0x0000000007350000-0x0000000007361000-memory.dmp

                        Filesize

                        68KB

                      • memory/780-51-0x00000000073D0000-0x0000000007466000-memory.dmp

                        Filesize

                        600KB

                      • memory/780-50-0x00000000071C0000-0x00000000071CA000-memory.dmp

                        Filesize

                        40KB

                      • memory/780-49-0x0000000007150000-0x000000000716A000-memory.dmp

                        Filesize

                        104KB

                      • memory/780-13-0x00000000024F0000-0x0000000002526000-memory.dmp

                        Filesize

                        216KB

                      • memory/780-14-0x0000000074770000-0x0000000074F20000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/780-15-0x0000000074770000-0x0000000074F20000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/780-16-0x0000000005020000-0x0000000005648000-memory.dmp

                        Filesize

                        6.2MB

                      • memory/780-45-0x0000000074770000-0x0000000074F20000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/780-18-0x0000000004F20000-0x0000000004F86000-memory.dmp

                        Filesize

                        408KB

                      • memory/780-19-0x0000000004F90000-0x0000000004FF6000-memory.dmp

                        Filesize

                        408KB

                      • memory/780-48-0x0000000007790000-0x0000000007E0A000-memory.dmp

                        Filesize

                        6.5MB

                      • memory/780-29-0x0000000005810000-0x0000000005B64000-memory.dmp

                        Filesize

                        3.3MB

                      • memory/780-30-0x0000000005E30000-0x0000000005E4E000-memory.dmp

                        Filesize

                        120KB

                      • memory/780-31-0x0000000005E50000-0x0000000005E9C000-memory.dmp

                        Filesize

                        304KB

                      • memory/780-32-0x0000000006E10000-0x0000000006E42000-memory.dmp

                        Filesize

                        200KB

                      • memory/780-34-0x0000000070110000-0x000000007015C000-memory.dmp

                        Filesize

                        304KB

                      • memory/780-47-0x0000000006E50000-0x0000000006EF3000-memory.dmp

                        Filesize

                        652KB

                      • memory/780-46-0x0000000074770000-0x0000000074F20000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/780-17-0x0000000004E80000-0x0000000004EA2000-memory.dmp

                        Filesize

                        136KB

                      • memory/2004-75-0x0000000001000000-0x0000000001027000-memory.dmp

                        Filesize

                        156KB

                      • memory/2372-10-0x0000000074770000-0x0000000074F20000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2372-12-0x0000000006360000-0x0000000006396000-memory.dmp

                        Filesize

                        216KB

                      • memory/2372-1-0x0000000000730000-0x00000000007A2000-memory.dmp

                        Filesize

                        456KB

                      • memory/2372-11-0x0000000006310000-0x0000000006366000-memory.dmp

                        Filesize

                        344KB

                      • memory/2372-6-0x00000000054B0000-0x0000000005506000-memory.dmp

                        Filesize

                        344KB

                      • memory/2372-9-0x000000007477E000-0x000000007477F000-memory.dmp

                        Filesize

                        4KB

                      • memory/2372-8-0x00000000056C0000-0x00000000056CA000-memory.dmp

                        Filesize

                        40KB

                      • memory/2372-7-0x0000000074770000-0x0000000074F20000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2372-0-0x000000007477E000-0x000000007477F000-memory.dmp

                        Filesize

                        4KB

                      • memory/2372-4-0x0000000005260000-0x00000000052F2000-memory.dmp

                        Filesize

                        584KB

                      • memory/2372-5-0x00000000051A0000-0x00000000051AA000-memory.dmp

                        Filesize

                        40KB

                      • memory/2372-2-0x00000000051C0000-0x000000000525C000-memory.dmp

                        Filesize

                        624KB

                      • memory/2372-3-0x0000000005810000-0x0000000005DB4000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/2372-67-0x0000000074770000-0x0000000074F20000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/3232-68-0x0000000001570000-0x00000000018BA000-memory.dmp

                        Filesize

                        3.3MB

                      • memory/3232-71-0x0000000001530000-0x0000000001544000-memory.dmp

                        Filesize

                        80KB

                      • memory/3232-70-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3232-74-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3232-65-0x0000000000400000-0x000000000042E000-memory.dmp

                        Filesize

                        184KB

                      • memory/3516-72-0x00000000085E0000-0x0000000008718000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/3516-79-0x00000000028A0000-0x0000000002950000-memory.dmp

                        Filesize

                        704KB

                      • memory/3516-76-0x00000000085E0000-0x0000000008718000-memory.dmp

                        Filesize

                        1.2MB