Analysis

  • max time kernel
    146s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2024 01:14

General

  • Target

    Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe

  • Size

    258KB

  • MD5

    1ec9c287f61dee3f7cee2dc216e8596f

  • SHA1

    2ce2bc72b3245447687fddc717dbc087573e9422

  • SHA256

    0112b086f601e1d8a6d10ce4e798dd5eaf379127cb99d5a4b4f44ec708457ffd

  • SHA512

    74568e623eec50754c1a0cf3e2db27e120777f8c80a80df94fac6f106b5b43d7a8a0f9b5375f86bdbc8122d49eac2127bb9167f2e6a7d658f2e9302fe8ab69e5

  • SSDEEP

    6144:mbE/HUba5PBYCt37k0AUck3UcrhNQxy7bjTRuFsC42TjKoagrM0:mb/aLPtLk9rkEcrkxey82TjKzyp

Malware Config

Extracted

Family

formbook

Campaign

avcn

Decoy

iQqc+b5jHA+W

gCI4O82LSsNA9tLkneHk6qA=

3I2qv1ZVYff+1Eo=

1YmmfbWjsiHmYcYjSVTf

NBsHMXP19khOJt2KMTEHhw==

phGkJ+uyWGow/gNhAcfxpNU4GLuUgXFcOg==

76S4kOajAII72kw=

YuoJB0X0+/LJtxIjSVTf

dfwI3SsaGogqBAZ4xhUx4B2g+LiF8XoFNA==

DPZ6AvfogdqUiZUq5K+3Jqk=

hnICZyINthreqpPpaLz9gQ==

yVh1ZpxISCr6h8b+MA==

/8Tg3VE+R7A/Bte6oC7kz/g4mz8Ufa4=

Nb5SuHlc+kxwGO5Oig5THgechA==

/NLWvgr7IAXcxzuueX/s6wJXODEI

/niFcKdVbQHAqH2y

Gac4n4YyRhvRYuK6

RtRr4pSUsjjOu7qsuv9FFBTuiHQ=

u1p5bblp59M=

qmh/ZV4PTj/IiNezISd2YeWw

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1256
      • C:\Users\Admin\AppData\Local\Temp\Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe
        "C:\Users\Admin\AppData\Local\Temp\Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe"
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe
          "C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2700
          • C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe
            "C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe"
            4⤵
            • Checks computer location settings
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2800
            • C:\Windows\SysWOW64\cmstp.exe
              "C:\Windows\SysWOW64\cmstp.exe"
              5⤵
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:2620

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bsdyoglyqor.r

      Filesize

      185KB

      MD5

      1e4e5fe5153c59256f6178ac541e53d0

      SHA1

      1ca49ca82dc80310e017f1d7be8c1e36eba01d24

      SHA256

      1f68a8c3efb02d3cefb6e49d8dba71acb16bbeaaa1686913120ad42d2991626a

      SHA512

      98e8d172d897a16cc7ca47c1e9d9b91f36b16a48733ab6c4d79169d7ec72416ccb341c9474fbe56dec4c39f3f5ad31b7bd4611aaa00cc8786640c4bc56bf8ec1

    • C:\Users\Admin\AppData\Local\Temp\dwvjvng.jan

      Filesize

      4KB

      MD5

      bf9a3bdedbd39546a400d1cd1850b4aa

      SHA1

      c915bb9ad5ce4defd8c5cfee4433d1dde789120c

      SHA256

      6830feee189372fd3145f58ce1a7c38203b5ac35b326446980c607bfe129c355

      SHA512

      117d5bb80f1a12abff70d8979abb19a6ec7a5dfa9c87e307b4defcfefde36d99c031efba4455824ce2243ef5726d784f2aae99915966282b5a341dc063345d4b

    • \Users\Admin\AppData\Local\Temp\yzoczjnuz.exe

      Filesize

      59KB

      MD5

      60ebe600e2d67c0877426dfd53be96d7

      SHA1

      83c0f3f77bec5df19f20ab0706ca736bd5e6e0d6

      SHA256

      fad978413cf6a36fbd03d3c96a5a08d0cf227e17710abddc06e73ae1913de648

      SHA512

      f0e2839211d84f2247a654f51ff07fe4c89f3d9ed71558e34479d8afe08aa9f606a65d1e53eaa0bea8287537de8f7e50427402f33a0339739b4dff7405a127eb

    • memory/1256-21-0x0000000003DC0000-0x0000000003E79000-memory.dmp

      Filesize

      740KB

    • memory/1256-28-0x0000000006D30000-0x0000000006ED7000-memory.dmp

      Filesize

      1.7MB

    • memory/1256-17-0x0000000003DC0000-0x0000000003E79000-memory.dmp

      Filesize

      740KB

    • memory/1256-22-0x0000000006D30000-0x0000000006ED7000-memory.dmp

      Filesize

      1.7MB

    • memory/2620-29-0x0000000000130000-0x000000000015D000-memory.dmp

      Filesize

      180KB

    • memory/2620-27-0x00000000005B0000-0x00000000005C8000-memory.dmp

      Filesize

      96KB

    • memory/2620-25-0x00000000005B0000-0x00000000005C8000-memory.dmp

      Filesize

      96KB

    • memory/2700-9-0x0000000000230000-0x0000000000232000-memory.dmp

      Filesize

      8KB

    • memory/2800-14-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/2800-19-0x0000000000423000-0x0000000000424000-memory.dmp

      Filesize

      4KB

    • memory/2800-20-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2800-26-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/2800-18-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/2800-16-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2800-15-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB