Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2024 07:33

General

  • Target

    020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe

  • Size

    724KB

  • MD5

    ab5eed71310107061cac2b4f3234ead5

  • SHA1

    83296a79376280e38d0677928eddca6d015a3e49

  • SHA256

    020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793

  • SHA512

    d549afa983e2640803814e34b13711f7a16a64d10a61620c2edc12c937bc13a0e9fe4f50135d9696984035547fbd9aaf5ff0e2020e8b135695e3b0c63f712d1e

  • SSDEEP

    12288:EQNABBz7krBNkt6QS9UwPlOu8NDupn9kDJCbXXojdRGyvI1EgdkjezUh6ji8z:N0ktNbJlv/puJCb

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

xpg

Decoy

nebuless.net

handsomelildevil.com

cancinauto.com

cassiemariesolutions.com

barbarabubble.com

activ8.xyz

findousd.com

cacingcau.com

dengfeng.chat

nsctherapy.com

bluedemonstudio.net

cftx168.com

migosbiz.com

utcannabis.tech

progressivewellnessrx.com

euralix.com

texasbestchambers.com

sensotop.com

dondosha.club

nfxaccountmanager.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe
    "C:\Users\Admin\AppData\Local\Temp\020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\020be63fb89a86567bdc2fc58848e98b94a3f0ff9ba305a1bdfd7e21ae80d793.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2972-6-0x0000000004ED0000-0x0000000004ED8000-memory.dmp

    Filesize

    32KB

  • memory/2972-8-0x000000007445E000-0x000000007445F000-memory.dmp

    Filesize

    4KB

  • memory/2972-2-0x00000000051B0000-0x0000000005754000-memory.dmp

    Filesize

    5.6MB

  • memory/2972-3-0x0000000004B20000-0x0000000004BB2000-memory.dmp

    Filesize

    584KB

  • memory/2972-4-0x0000000074450000-0x0000000074C00000-memory.dmp

    Filesize

    7.7MB

  • memory/2972-5-0x0000000004BE0000-0x0000000004BEA000-memory.dmp

    Filesize

    40KB

  • memory/2972-1-0x0000000000090000-0x000000000014A000-memory.dmp

    Filesize

    744KB

  • memory/2972-7-0x0000000005E00000-0x0000000005E9C000-memory.dmp

    Filesize

    624KB

  • memory/2972-0-0x000000007445E000-0x000000007445F000-memory.dmp

    Filesize

    4KB

  • memory/2972-9-0x0000000074450000-0x0000000074C00000-memory.dmp

    Filesize

    7.7MB

  • memory/2972-10-0x00000000077B0000-0x000000000783C000-memory.dmp

    Filesize

    560KB

  • memory/2972-11-0x0000000009EC0000-0x0000000009EFA000-memory.dmp

    Filesize

    232KB

  • memory/2972-14-0x0000000074450000-0x0000000074C00000-memory.dmp

    Filesize

    7.7MB

  • memory/4080-12-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4080-15-0x0000000001530000-0x000000000187A000-memory.dmp

    Filesize

    3.3MB