Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2024 02:29

General

  • Target

    Payment update.exe

  • Size

    741KB

  • MD5

    bf34896fa20667412fdfc4f2da5b2b2d

  • SHA1

    7af4a5bbb6e45110543cff78a221075cea4de721

  • SHA256

    5810c640bb4219ca39bc8a0c8b50f8447e5e47784e75dfdacdce65d5d2c31e47

  • SHA512

    adb61d4380e54e03d3aa80ec099fb4a5ba7e78e0246adf1e548f83e8e7adff03067508b637798c8d076960059444adbc981f02ae2ec6e47838be43f83e4c028e

  • SSDEEP

    12288:mz2WFHmst7SPQnpAVH2rXOqoZ/wNQm0G+oB7hXC/2aEMnJWYTl:glHT7SPQuFT/80GVBlX/MnJWYT

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

bmmo

Decoy

nosethecat.com

sanfranciscoclothes.com

laonzeprime.com

ecscart.com

pruearomablends.com

birdhousecustoms.com

giftforchange.com

madribr.com

thepickupmerchant.xyz

lidajian.com

gsxsell.com

cancerandwt1.com

paradisereport.com

wpsexcel.com

baranbey.com

kp3d.net

healous.com

eagerlygrowing.com

faultydev.com

virtualcarenearme.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3476
    • C:\Users\Admin\AppData\Local\Temp\Payment update.exe
      "C:\Users\Admin\AppData\Local\Temp\Payment update.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3776
      • C:\Users\Admin\AppData\Local\Temp\Payment update.exe
        "C:\Users\Admin\AppData\Local\Temp\Payment update.exe"
        3⤵
          PID:4552
        • C:\Users\Admin\AppData\Local\Temp\Payment update.exe
          "C:\Users\Admin\AppData\Local\Temp\Payment update.exe"
          3⤵
            PID:4828
          • C:\Users\Admin\AppData\Local\Temp\Payment update.exe
            "C:\Users\Admin\AppData\Local\Temp\Payment update.exe"
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:2272
        • C:\Windows\SysWOW64\WWAHost.exe
          "C:\Windows\SysWOW64\WWAHost.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2412
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Users\Admin\AppData\Local\Temp\Payment update.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:1364

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2272-13-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2272-19-0x00000000019A0000-0x00000000019B4000-memory.dmp

        Filesize

        80KB

      • memory/2272-18-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2272-16-0x00000000014C0000-0x000000000180A000-memory.dmp

        Filesize

        3.3MB

      • memory/2412-23-0x0000000000A40000-0x0000000000B1C000-memory.dmp

        Filesize

        880KB

      • memory/2412-22-0x0000000000A40000-0x0000000000B1C000-memory.dmp

        Filesize

        880KB

      • memory/3476-31-0x0000000008D20000-0x0000000008E31000-memory.dmp

        Filesize

        1.1MB

      • memory/3476-29-0x0000000008D20000-0x0000000008E31000-memory.dmp

        Filesize

        1.1MB

      • memory/3476-28-0x0000000008D20000-0x0000000008E31000-memory.dmp

        Filesize

        1.1MB

      • memory/3476-24-0x00000000089E0000-0x0000000008B70000-memory.dmp

        Filesize

        1.6MB

      • memory/3476-20-0x00000000089E0000-0x0000000008B70000-memory.dmp

        Filesize

        1.6MB

      • memory/3776-6-0x0000000075180000-0x0000000075930000-memory.dmp

        Filesize

        7.7MB

      • memory/3776-7-0x0000000004DE0000-0x0000000004E36000-memory.dmp

        Filesize

        344KB

      • memory/3776-11-0x00000000086B0000-0x0000000008740000-memory.dmp

        Filesize

        576KB

      • memory/3776-15-0x0000000075180000-0x0000000075930000-memory.dmp

        Filesize

        7.7MB

      • memory/3776-10-0x0000000075180000-0x0000000075930000-memory.dmp

        Filesize

        7.7MB

      • memory/3776-9-0x000000007518E000-0x000000007518F000-memory.dmp

        Filesize

        4KB

      • memory/3776-8-0x0000000004E50000-0x0000000004E66000-memory.dmp

        Filesize

        88KB

      • memory/3776-12-0x000000000AED0000-0x000000000AF28000-memory.dmp

        Filesize

        352KB

      • memory/3776-0-0x000000007518E000-0x000000007518F000-memory.dmp

        Filesize

        4KB

      • memory/3776-5-0x0000000004AA0000-0x0000000004AAA000-memory.dmp

        Filesize

        40KB

      • memory/3776-4-0x0000000004B90000-0x0000000004C22000-memory.dmp

        Filesize

        584KB

      • memory/3776-3-0x0000000005140000-0x00000000056E4000-memory.dmp

        Filesize

        5.6MB

      • memory/3776-2-0x0000000004AF0000-0x0000000004B8C000-memory.dmp

        Filesize

        624KB

      • memory/3776-1-0x0000000000130000-0x00000000001F0000-memory.dmp

        Filesize

        768KB