Analysis

  • max time kernel
    145s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2024 01:14

General

  • Target

    yzoczjnuz.exe

  • Size

    59KB

  • MD5

    60ebe600e2d67c0877426dfd53be96d7

  • SHA1

    83c0f3f77bec5df19f20ab0706ca736bd5e6e0d6

  • SHA256

    fad978413cf6a36fbd03d3c96a5a08d0cf227e17710abddc06e73ae1913de648

  • SHA512

    f0e2839211d84f2247a654f51ff07fe4c89f3d9ed71558e34479d8afe08aa9f606a65d1e53eaa0bea8287537de8f7e50427402f33a0339739b4dff7405a127eb

  • SSDEEP

    1536:WgvtLu0ZssXg2J2m3K5n2ETMCZQsuyXn5QnQC:WACsPEvMCi32nCnQC

Malware Config

Extracted

Family

formbook

Campaign

avcn

Decoy

iQqc+b5jHA+W

gCI4O82LSsNA9tLkneHk6qA=

3I2qv1ZVYff+1Eo=

1YmmfbWjsiHmYcYjSVTf

NBsHMXP19khOJt2KMTEHhw==

phGkJ+uyWGow/gNhAcfxpNU4GLuUgXFcOg==

76S4kOajAII72kw=

YuoJB0X0+/LJtxIjSVTf

dfwI3SsaGogqBAZ4xhUx4B2g+LiF8XoFNA==

DPZ6AvfogdqUiZUq5K+3Jqk=

hnICZyINthreqpPpaLz9gQ==

yVh1ZpxISCr6h8b+MA==

/8Tg3VE+R7A/Bte6oC7kz/g4mz8Ufa4=

Nb5SuHlc+kxwGO5Oig5THgechA==

/NLWvgr7IAXcxzuueX/s6wJXODEI

/niFcKdVbQHAqH2y

Gac4n4YyRhvRYuK6

RtRr4pSUsjjOu7qsuv9FFBTuiHQ=

u1p5bblp59M=

qmh/ZV4PTj/IiNezISd2YeWw

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe
      "C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe
        "C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1212
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\SysWOW64\wscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/880-7-0x0000000000180000-0x00000000001A6000-memory.dmp

    Filesize

    152KB

  • memory/880-10-0x0000000000180000-0x00000000001A6000-memory.dmp

    Filesize

    152KB

  • memory/880-11-0x0000000000070000-0x000000000009D000-memory.dmp

    Filesize

    180KB

  • memory/1212-2-0x0000000000401000-0x000000000042F000-memory.dmp

    Filesize

    184KB

  • memory/1212-3-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1212-4-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1212-8-0x0000000000401000-0x000000000042F000-memory.dmp

    Filesize

    184KB

  • memory/1424-5-0x0000000007DA0000-0x0000000007ED3000-memory.dmp

    Filesize

    1.2MB

  • memory/1424-12-0x0000000007DA0000-0x0000000007ED3000-memory.dmp

    Filesize

    1.2MB

  • memory/2084-0-0x0000000000230000-0x0000000000232000-memory.dmp

    Filesize

    8KB