Analysis

  • max time kernel
    148s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2024 02:29

General

  • Target

    Payment update.exe

  • Size

    741KB

  • MD5

    bf34896fa20667412fdfc4f2da5b2b2d

  • SHA1

    7af4a5bbb6e45110543cff78a221075cea4de721

  • SHA256

    5810c640bb4219ca39bc8a0c8b50f8447e5e47784e75dfdacdce65d5d2c31e47

  • SHA512

    adb61d4380e54e03d3aa80ec099fb4a5ba7e78e0246adf1e548f83e8e7adff03067508b637798c8d076960059444adbc981f02ae2ec6e47838be43f83e4c028e

  • SSDEEP

    12288:mz2WFHmst7SPQnpAVH2rXOqoZ/wNQm0G+oB7hXC/2aEMnJWYTl:glHT7SPQuFT/80GVBlX/MnJWYT

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

bmmo

Decoy

nosethecat.com

sanfranciscoclothes.com

laonzeprime.com

ecscart.com

pruearomablends.com

birdhousecustoms.com

giftforchange.com

madribr.com

thepickupmerchant.xyz

lidajian.com

gsxsell.com

cancerandwt1.com

paradisereport.com

wpsexcel.com

baranbey.com

kp3d.net

healous.com

eagerlygrowing.com

faultydev.com

virtualcarenearme.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\Payment update.exe
      "C:\Users\Admin\AppData\Local\Temp\Payment update.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1848
      • C:\Users\Admin\AppData\Local\Temp\Payment update.exe
        "C:\Users\Admin\AppData\Local\Temp\Payment update.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2628
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Payment update.exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1224-23-0x00000000068C0000-0x0000000006A52000-memory.dmp

    Filesize

    1.6MB

  • memory/1224-17-0x0000000000360000-0x0000000000460000-memory.dmp

    Filesize

    1024KB

  • memory/1224-20-0x00000000068C0000-0x0000000006A52000-memory.dmp

    Filesize

    1.6MB

  • memory/1848-14-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/1848-1-0x00000000001E0000-0x00000000002A0000-memory.dmp

    Filesize

    768KB

  • memory/1848-2-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/1848-3-0x0000000000320000-0x0000000000336000-memory.dmp

    Filesize

    88KB

  • memory/1848-4-0x000000007408E000-0x000000007408F000-memory.dmp

    Filesize

    4KB

  • memory/1848-5-0x0000000074080000-0x000000007476E000-memory.dmp

    Filesize

    6.9MB

  • memory/1848-6-0x0000000007D00000-0x0000000007D90000-memory.dmp

    Filesize

    576KB

  • memory/1848-7-0x00000000050E0000-0x0000000005138000-memory.dmp

    Filesize

    352KB

  • memory/1848-0-0x000000007408E000-0x000000007408F000-memory.dmp

    Filesize

    4KB

  • memory/2628-13-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2628-19-0x00000000002A0000-0x00000000002B4000-memory.dmp

    Filesize

    80KB

  • memory/2628-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2628-18-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2628-9-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2628-15-0x0000000000990000-0x0000000000C93000-memory.dmp

    Filesize

    3.0MB

  • memory/2628-8-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2640-21-0x00000000006B0000-0x00000000006B7000-memory.dmp

    Filesize

    28KB

  • memory/2640-22-0x00000000006B0000-0x00000000006B7000-memory.dmp

    Filesize

    28KB