Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2024 14:08

General

  • Target

    jetsoff7785645.exe

  • Size

    1.3MB

  • MD5

    e490f6c7cd9da30e00552d99d40a67d5

  • SHA1

    303aa4cecd54421ada7ae26d4e226cdd7272bff7

  • SHA256

    03df164dae575c2017f7e03af8a2fab8635366e6eca3db93501233ed641d022e

  • SHA512

    7094940fa63a295b42d880d1d2badf4f9afad0d95db37f77432124f6d2571f224093603a65e4c81d02ce7cbdf4550b33ab262853e4d259e9d4ec0e26896e341e

  • SSDEEP

    24576:iAOcZXp0NBVQVxjvhGYux6V7xRF2UkjPV99npuezy71oporahu:ohHQVVvhJI43YUkj9fZe6GH

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

je14

Decoy

innervisionbuildings.com

theenergysocialite.com

565548.com

panghr.com

onlyonesolutions.com

stjohnzone6.com

cnotes.rest

helfeb.online

xixi-s-inc.club

easilyentered.com

theshopx.store

mrclean-ac.com

miamibeachwateradventures.com

jpearce.co.uk

seseragi-bunkou.com

minimaddie.com

commbank-help-849c3.com

segohandelsonderneming.com

namthanhreal.com

fototerapi.online

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3584
    • C:\Users\Admin\AppData\Local\Temp\jetsoff7785645.exe
      "C:\Users\Admin\AppData\Local\Temp\jetsoff7785645.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\6_64\lporbpo.pif
        "C:\Users\Admin\AppData\Local\Temp\6_64\lporbpo.pif" fwouagex.osh
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3752
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          4⤵
            PID:4020
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3536
            • C:\Windows\SysWOW64\cscript.exe
              "C:\Windows\SysWOW64\cscript.exe"
              5⤵
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4960
              • C:\Windows\SysWOW64\cmd.exe
                /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                6⤵
                • System Location Discovery: System Language Discovery
                PID:3184

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\6_64\bdoiapgxat.jbv

      Filesize

      370KB

      MD5

      face4060089272f6ae3596e0fd074dfb

      SHA1

      7297224ceb6ca4e91eb34c916adc27d78f9fcca4

      SHA256

      d2aba9392dd810d9146f5ddce3c061d59424baf4513aa735c6495564de0fc242

      SHA512

      a4b12e86d964b69c26100382563f936b959b028023629146f5119b6560e34cd4bfdfc1247136466fb348d34c057b7bbc7839d402efac311e8125f3e733537702

    • C:\Users\Admin\AppData\Local\Temp\6_64\lporbpo.pif

      Filesize

      1.7MB

      MD5

      dd3466f64841cf21fc31f63f03dbfd29

      SHA1

      3878c8e52203d792c6f672595f7c78ab27ce3f04

      SHA256

      4fe3004208ed574521992dd1ba3d900b75a0f02f1d63ba1e531d309e85ffa06b

      SHA512

      adf3fe8378f7da5ba278db9a1df4cc7b5cff12398ec39ee7037382ebf57897de8bec72be64b5e7332bdb7ed865788dcb6ef4ceda6654e1153d39fe84b011b057

    • C:\Users\Admin\AppData\Local\Temp\6_64\uuvrscqbfj.xml

      Filesize

      38KB

      MD5

      e8eeee13ee27e7f90d2b123b85b76e5f

      SHA1

      1257f205999b5f5477b43f70cc907c8e629056bf

      SHA256

      6524c5bbb9e2cda587aa3bec11f937b2f1aaa1005c6836d0c858f0e9fbcd55a6

      SHA512

      3e6bf380902e63675de0c20fcbc47cffc508f69caf5dac1390b83b6444d3cbafb5c6af3cd878ad4a6c7e19adbbce66a12cf1b00c6ab496e9cdfd960a6b18e26b

    • memory/3536-87-0x0000000001890000-0x00000000018A4000-memory.dmp

      Filesize

      80KB

    • memory/3536-79-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3536-80-0x0000000001900000-0x0000000001C4A000-memory.dmp

      Filesize

      3.3MB

    • memory/3536-82-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3536-83-0x0000000001820000-0x0000000001834000-memory.dmp

      Filesize

      80KB

    • memory/3536-86-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3584-88-0x00000000087B0000-0x00000000088BF000-memory.dmp

      Filesize

      1.1MB

    • memory/3584-84-0x0000000008A20000-0x0000000008BC2000-memory.dmp

      Filesize

      1.6MB

    • memory/3584-89-0x0000000008A20000-0x0000000008BC2000-memory.dmp

      Filesize

      1.6MB

    • memory/3584-92-0x00000000087B0000-0x00000000088BF000-memory.dmp

      Filesize

      1.1MB

    • memory/3584-96-0x0000000003030000-0x00000000030FF000-memory.dmp

      Filesize

      828KB

    • memory/4960-90-0x00000000003E0000-0x0000000000407000-memory.dmp

      Filesize

      156KB

    • memory/4960-91-0x00000000003E0000-0x0000000000407000-memory.dmp

      Filesize

      156KB

    • memory/4960-93-0x0000000000340000-0x000000000036F000-memory.dmp

      Filesize

      188KB