Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2024 11:07

General

  • Target

    HNGC 04 ORDER DOCKET & BLUEPRINT.exe

  • Size

    1010KB

  • MD5

    7da2caa62ac9ebc22d4c4652c1c64a40

  • SHA1

    b872068a8c0836088f4b480b547cd3976f2e2ff6

  • SHA256

    ce52755476e6ccbe1ac1c8d850eacdc8d3ce3ccfc71e932df8709c4abe1f8899

  • SHA512

    bd1f94dd259771a5df2b076e64f975f661b2c6ef4c148bfb8900750cbf1e4abb5ac083da80f88714a24cb9436b240d07c227ce11051c00e7904a6c342545e9cd

  • SSDEEP

    24576:Ok5akazqoRlErfFVqNoRRRRRjXtAmA0ZSE:Ok5aka5ShVqNoRRRRRjdAmA0

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

r4ei

Decoy

8clintonstreet.com

sherylhotpepperblends.com

eucham.asia

earnestqueen.com

vstexchange.com

theoutofbounds.com

allincursive.com

getgenevieved.com

commonlawpeoplesassembly.net

brideclubstorerastreamento.com

cngelectricaldesign.com

mizmaleather.com

nicolabenge.com

babyboxbuy.com

xaydungquan9.com

hclifechurch.com

cwyxonlp.icu

inocentkidd.com

worldhw.com

soul.exchange

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Users\Admin\AppData\Local\Temp\HNGC 04 ORDER DOCKET & BLUEPRINT.exe
      "C:\Users\Admin\AppData\Local\Temp\HNGC 04 ORDER DOCKET & BLUEPRINT.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\HNGC 04 ORDER DOCKET & BLUEPRINT.exe
        "C:\Users\Admin\AppData\Local\Temp\HNGC 04 ORDER DOCKET & BLUEPRINT.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4292
    • C:\Windows\SysWOW64\cmstp.exe
      "C:\Windows\SysWOW64\cmstp.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\HNGC 04 ORDER DOCKET & BLUEPRINT.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2108-23-0x00000000004D0000-0x00000000004FE000-memory.dmp

    Filesize

    184KB

  • memory/2108-22-0x0000000000E90000-0x0000000000EA6000-memory.dmp

    Filesize

    88KB

  • memory/2108-21-0x0000000000E90000-0x0000000000EA6000-memory.dmp

    Filesize

    88KB

  • memory/3440-29-0x0000000006E00000-0x0000000006E98000-memory.dmp

    Filesize

    608KB

  • memory/3440-28-0x0000000006E00000-0x0000000006E98000-memory.dmp

    Filesize

    608KB

  • memory/3440-24-0x0000000008090000-0x00000000081F8000-memory.dmp

    Filesize

    1.4MB

  • memory/3440-20-0x0000000008090000-0x00000000081F8000-memory.dmp

    Filesize

    1.4MB

  • memory/4292-13-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4292-18-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4292-19-0x00000000010F0000-0x0000000001104000-memory.dmp

    Filesize

    80KB

  • memory/4292-16-0x00000000011E0000-0x000000000152A000-memory.dmp

    Filesize

    3.3MB

  • memory/5048-6-0x00000000052A0000-0x00000000052F6000-memory.dmp

    Filesize

    344KB

  • memory/5048-7-0x0000000074840000-0x0000000074FF0000-memory.dmp

    Filesize

    7.7MB

  • memory/5048-11-0x0000000005DA0000-0x0000000005E2C000-memory.dmp

    Filesize

    560KB

  • memory/5048-15-0x0000000074840000-0x0000000074FF0000-memory.dmp

    Filesize

    7.7MB

  • memory/5048-10-0x0000000074840000-0x0000000074FF0000-memory.dmp

    Filesize

    7.7MB

  • memory/5048-9-0x000000007484E000-0x000000007484F000-memory.dmp

    Filesize

    4KB

  • memory/5048-8-0x0000000005560000-0x0000000005570000-memory.dmp

    Filesize

    64KB

  • memory/5048-12-0x0000000000E00000-0x0000000000E44000-memory.dmp

    Filesize

    272KB

  • memory/5048-0-0x000000007484E000-0x000000007484F000-memory.dmp

    Filesize

    4KB

  • memory/5048-5-0x0000000005040000-0x000000000504A000-memory.dmp

    Filesize

    40KB

  • memory/5048-4-0x0000000005060000-0x00000000050F2000-memory.dmp

    Filesize

    584KB

  • memory/5048-3-0x0000000005570000-0x0000000005B14000-memory.dmp

    Filesize

    5.6MB

  • memory/5048-2-0x0000000004F20000-0x0000000004FBC000-memory.dmp

    Filesize

    624KB

  • memory/5048-1-0x00000000004A0000-0x00000000005A2000-memory.dmp

    Filesize

    1.0MB