Analysis

  • max time kernel
    146s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2024, 05:56

General

  • Target

    Profoma Invoice _568432.exe

  • Size

    527KB

  • MD5

    054e0e3655b99a7bdf021829434d5ef0

  • SHA1

    7b263ee8c787e893c776df4a97c3c1076e4d25cd

  • SHA256

    27b5c6cd7f2f32176249bd457017b2fc1f021d49cd4b2699c49bf2f2519b60f9

  • SHA512

    ed43f425c0d650869eb85c341584d60c2d479265bec770b370056a6ad3bc0828506d17706d248156e2ddc647431f899d49581f74cb267928fdc7c590c1b3cbde

  • SSDEEP

    12288:rJSjhrSXUqnZ1olPw5YIMa1TrYRWjgnETy2ZRfW:tFX3foVw5XPnidETba

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g09e

Decoy

flyinglarkgp.com

spiritsyncing.net

sushikreci.com

drssdup.com

mobileappsus.com

lvrcprbrisbane.com

nfjnwa.icu

ottenbruch.immo

strinosoft.com

portershoecollection.com

electriccarsus.com

lecai.icu

piplespnd.quest

talkrecords.com

lowcodeconnection.com

lastwagenfahrerjobshierorg.com

kpallman.com

dcrdr.com

chainalysisinfo.com

einayaa.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Users\Admin\AppData\Local\Temp\Profoma Invoice _568432.exe
      "C:\Users\Admin\AppData\Local\Temp\Profoma Invoice _568432.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:584
      • C:\Users\Admin\AppData\Local\Temp\svttgvela.exe
        C:\Users\Admin\AppData\Local\Temp\svttgvela.exe C:\Users\Admin\AppData\Local\Temp\oeyxqir
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2960
        • C:\Users\Admin\AppData\Local\Temp\svttgvela.exe
          C:\Users\Admin\AppData\Local\Temp\svttgvela.exe C:\Users\Admin\AppData\Local\Temp\oeyxqir
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2596
    • C:\Windows\SysWOW64\wuapp.exe
      "C:\Windows\SysWOW64\wuapp.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\svttgvela.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6sif1tny9ip2gl

    Filesize

    211KB

    MD5

    5e5d5c45d6343c13672603095bcb3310

    SHA1

    767e85e7d68e1f2fc39eac3417dd8b011756ad6a

    SHA256

    6a9ae755ba7601f3bc33338f85c76b9c5c1c0f6710b96d01e6f70fdb7211e5f0

    SHA512

    7265cc8c92fddd5553e50ce2c04cd835e7a215816e3c53f6dccf103c91e27be0896fc6cbd45126cf55ca03d8da462f611048e265e87482ba432b9b980afdb419

  • C:\Users\Admin\AppData\Local\Temp\oeyxqir

    Filesize

    5KB

    MD5

    571af5ca739d87a859f150f9b4894057

    SHA1

    905165fbeb2cf556877e3050fc9bfe42081abd20

    SHA256

    0d6a046a8ebb8623da63e94b3792d213c19ff8545d00bee2425b7ef2ba7f515c

    SHA512

    6dc654355195ecc6d88bc13b0c9276d486459139f0c6aa1476f30d0466329bcdcc3ab34999adfc671564fc92fc0208f351712f86856518b9884d7c3e004f5aea

  • \Users\Admin\AppData\Local\Temp\svttgvela.exe

    Filesize

    118KB

    MD5

    c627aca7ccf84f92622c5f83da4190ba

    SHA1

    83d7c0310e6e6c97cbdfea8fc0cbd2fee697fb5e

    SHA256

    4c166ca71399d8dd2cc895d0892dbf28ea2b5d883b6e310be7db76cf2d16066b

    SHA512

    465504c77cad06a7047e25aef1b5e351aff88bfea46cb848dc391e782d8c7f535be9379475645264574fe34f302a4d08ac92c801a568b54dd92cc63158cbb3bc

  • memory/1364-17-0x00000000074B0000-0x0000000007618000-memory.dmp

    Filesize

    1.4MB

  • memory/1364-23-0x00000000074B0000-0x0000000007618000-memory.dmp

    Filesize

    1.4MB

  • memory/1364-28-0x0000000004E40000-0x0000000004F14000-memory.dmp

    Filesize

    848KB

  • memory/1364-29-0x0000000004E40000-0x0000000004F14000-memory.dmp

    Filesize

    848KB

  • memory/1364-31-0x0000000004E40000-0x0000000004F14000-memory.dmp

    Filesize

    848KB

  • memory/2596-12-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2596-16-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2876-21-0x0000000000E10000-0x0000000000E1B000-memory.dmp

    Filesize

    44KB

  • memory/2876-20-0x0000000000E10000-0x0000000000E1B000-memory.dmp

    Filesize

    44KB

  • memory/2876-22-0x00000000000D0000-0x00000000000FF000-memory.dmp

    Filesize

    188KB

  • memory/2960-9-0x0000000000250000-0x0000000000252000-memory.dmp

    Filesize

    8KB