Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2024 22:36

General

  • Target

    be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe

  • Size

    775KB

  • MD5

    94c1e957b1e28c57ef9ce07ccc914a32

  • SHA1

    1aeec2fa9616e7751c83e788faa3e8af83ba059c

  • SHA256

    be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78

  • SHA512

    7cad46367a0e2fb7a3261804d283e6d33f2a45b60b10a4c16562bd1b1a29f894b2ef65fad3d355fedbd590042c5202713518cb46496655c305231083d8caa6a8

  • SSDEEP

    12288:B2iN3M/CcdMo5E72KRgm9nnmzbjkcgIvr39oo3F5/W+:B1CaN72KRgmRmjkU3io3F93

Malware Config

Extracted

Family

formbook

Campaign

g44n

Decoy

t60gB4YRvsDLttd9HG4=

xck8G7COQ+g7VIpX

BQQF3mmpLPskhQ==

eLWwmzNyK6ee+nF1jDvvkxuSGA==

3tlgNOzw8BBjpNOQMnc=

nOpNEJhoU0h+00S9E1YfgA==

xcvTpljkjIyEdvhp+VcGFtJC

bZxOHr5CtzY4

rOD304X0u1DN/m7cbA==

Knixl0HJyEOOiNckwk8GFtJC

S4JMDRNTUAol

Vp9wSwNZSfY7VIpX

0Nf/zlrpmpahnM+tpkYGFtJC

joXsuHiBcVp88DHEHMA7

yN8i9ppoZYHSSaqqk6NZnQ==

4UFEMfyKhSB4UovzjdabqolwhFtMH1M=

d3RiRcXCeR8wlgjEHMA7

eMUS8PSBPCe2rPg=

LCsR0X328UuSAmlf

/keifSXopayqjLt1EWQ=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe
    "C:\Users\Admin\AppData\Local\Temp\be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Users\Admin\AppData\Local\Temp\be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe
      "C:\Users\Admin\AppData\Local\Temp\be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2744-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2744-19-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2744-18-0x00000000008B0000-0x0000000000BB3000-memory.dmp

    Filesize

    3.0MB

  • memory/2744-9-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2744-15-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2744-16-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2744-10-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2744-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2860-4-0x0000000074CBE000-0x0000000074CBF000-memory.dmp

    Filesize

    4KB

  • memory/2860-8-0x0000000000BE0000-0x0000000000C16000-memory.dmp

    Filesize

    216KB

  • memory/2860-7-0x00000000050C0000-0x0000000005130000-memory.dmp

    Filesize

    448KB

  • memory/2860-6-0x0000000000680000-0x000000000068C000-memory.dmp

    Filesize

    48KB

  • memory/2860-5-0x0000000074CB0000-0x000000007539E000-memory.dmp

    Filesize

    6.9MB

  • memory/2860-0-0x0000000074CBE000-0x0000000074CBF000-memory.dmp

    Filesize

    4KB

  • memory/2860-3-0x00000000006E0000-0x00000000006F8000-memory.dmp

    Filesize

    96KB

  • memory/2860-17-0x0000000074CB0000-0x000000007539E000-memory.dmp

    Filesize

    6.9MB

  • memory/2860-2-0x0000000074CB0000-0x000000007539E000-memory.dmp

    Filesize

    6.9MB

  • memory/2860-1-0x0000000000C20000-0x0000000000CE8000-memory.dmp

    Filesize

    800KB