Analysis

  • max time kernel
    124s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2024 11:38

General

  • Target

    741815376052dfd9c8dda9031633196530d185b85f9820e1d4a2f0ffaa149b67.exe

  • Size

    451KB

  • MD5

    daee820ef921e5598c815d66fa140046

  • SHA1

    f9af4821c764e6d682e362b209ad15974eae1a84

  • SHA256

    741815376052dfd9c8dda9031633196530d185b85f9820e1d4a2f0ffaa149b67

  • SHA512

    092f2f1504d93c05dfb8adcd5471d5cf30fe1b466da140230a8a9ba1ea69e3be51359c35acfb2ec9a3682d853a4013c465f0ae71687645039553a8fd5b9ca163

  • SSDEEP

    6144:3aV2T2YxNvJX/wFbJgCsuEsssQI+bELiQ4eyxgRN9MwMCaToCq5EvxKoLAN:3aV2pNvJX/wFbJEW+vzx+FYoCq5NW0

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

fzd

Decoy

vn-mua-hang-onlike.site

creationsbylisaq.com

clouduwo.com

archlvedata.com

casanoriamaderas.com

plouceur.com

thrivewarrioracademy.com

saraviafirma.com

letstalktech.tech

rhetfox.com

clmssouth.com

thecatstits.net

mepain.space

thepapaya.xyz

gaplek.net

llcom.net

estrategassocial.com

sliming.life

progressofindia.com

fakedoctorsrealfriendsmerch.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\741815376052dfd9c8dda9031633196530d185b85f9820e1d4a2f0ffaa149b67.exe
    "C:\Users\Admin\AppData\Local\Temp\741815376052dfd9c8dda9031633196530d185b85f9820e1d4a2f0ffaa149b67.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Local\Temp\741815376052dfd9c8dda9031633196530d185b85f9820e1d4a2f0ffaa149b67.exe
      "C:\Users\Admin\AppData\Local\Temp\741815376052dfd9c8dda9031633196530d185b85f9820e1d4a2f0ffaa149b67.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2272-6-0x0000000004B50000-0x0000000004B5A000-memory.dmp

    Filesize

    40KB

  • memory/2272-8-0x000000007443E000-0x000000007443F000-memory.dmp

    Filesize

    4KB

  • memory/2272-2-0x0000000005050000-0x00000000055F4000-memory.dmp

    Filesize

    5.6MB

  • memory/2272-3-0x0000000004B80000-0x0000000004C12000-memory.dmp

    Filesize

    584KB

  • memory/2272-4-0x0000000004C20000-0x0000000004CBC000-memory.dmp

    Filesize

    624KB

  • memory/2272-5-0x0000000074430000-0x0000000074BE0000-memory.dmp

    Filesize

    7.7MB

  • memory/2272-1-0x00000000000E0000-0x0000000000156000-memory.dmp

    Filesize

    472KB

  • memory/2272-7-0x0000000004EA0000-0x0000000004EA8000-memory.dmp

    Filesize

    32KB

  • memory/2272-0-0x000000007443E000-0x000000007443F000-memory.dmp

    Filesize

    4KB

  • memory/2272-9-0x0000000074430000-0x0000000074BE0000-memory.dmp

    Filesize

    7.7MB

  • memory/2272-10-0x0000000000910000-0x000000000096C000-memory.dmp

    Filesize

    368KB

  • memory/2272-13-0x0000000074430000-0x0000000074BE0000-memory.dmp

    Filesize

    7.7MB

  • memory/3512-11-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3512-14-0x00000000013A0000-0x00000000016EA000-memory.dmp

    Filesize

    3.3MB

  • memory/3512-15-0x00000000013A0000-0x00000000016EA000-memory.dmp

    Filesize

    3.3MB