Analysis

  • max time kernel
    94s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2024, 09:41

General

  • Target

    LPO NO - 19615.exe

  • Size

    252KB

  • MD5

    bc2c939dc95ccb7c1ab6b593c5e7fc36

  • SHA1

    077fa9ad551e0f3eeab0807fdc090e1d7c8484dd

  • SHA256

    915861e0bf6cb3a567b8ce22c1ab89626d9f1ab175cd8bb4eab4d8232cc2b880

  • SHA512

    5c55ec7670fa61d314c9202a0a244c05a4e94f36c6a0ae8097b89693b5c49e2d8bf4faa1fa0dc3dd4fa721b88ac2f549735d7b38d17881217d6de5b28c0977a4

  • SSDEEP

    6144:pb3/W+HZZn3rbykHzxjjlZoXDfVh+pehqyu50+zOzR+3OfK2:pbO+5Z36kNHobj+LDLzOw3OfK

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

fn02

Decoy

wkinforresearch.com

hnfsclw.com

flow2live.com

2bveruyucdxnerf2.com

art-istratova.online

day2plus.net

finovatio.com

50706.net

theabotanicalsph.com

longcovid.run

semperempoweringequity.com

consumerismbarbarica.com

rightloaddispatching.com

tansonews.com

emakz-nih.com

dbluxurycarrentals.com

streetfood-real.store

fagamotorsperu.com

consortiumwatches.com

intodialog.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Core1 .NET packer 1 IoCs

    Detects packer/loader used by .NET malware.

  • Formbook payload 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LPO NO - 19615.exe
    "C:\Users\Admin\AppData\Local\Temp\LPO NO - 19615.exe"
    1⤵
      PID:4056

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4056-0-0x00007FFFDA293000-0x00007FFFDA295000-memory.dmp

      Filesize

      8KB

    • memory/4056-1-0x0000000000C60000-0x0000000000CA4000-memory.dmp

      Filesize

      272KB

    • memory/4056-2-0x0000000001A50000-0x0000000001AAC000-memory.dmp

      Filesize

      368KB

    • memory/4056-3-0x0000000001AD0000-0x0000000001B18000-memory.dmp

      Filesize

      288KB

    • memory/4056-5-0x00007FFFDA290000-0x00007FFFDAD51000-memory.dmp

      Filesize

      10.8MB

    • memory/4056-6-0x00007FFFDA290000-0x00007FFFDAD51000-memory.dmp

      Filesize

      10.8MB