Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2024 03:38

General

  • Target

    SKM_C224e2104221317034443434434342244347.exe

  • Size

    254KB

  • MD5

    b312e3f54db0e9ba83b2a454b5de4bf1

  • SHA1

    d5e9f1c71b6fc9b30c61a7267a4b5b032a611c9f

  • SHA256

    6a06e74bde0a136b6d9b96b6093e1fc6d09f78adb6b167adcf82106356de3388

  • SHA512

    5155e3aa8bd6a5c405bfbe92c66ad6e616b6e3c8c07d7ec5a54e09c247f8c3e514696e4104a71903f5f22f38085c68529f1df6eae46cc1edeb89725b76423e8e

  • SSDEEP

    6144:wBlL/chrXUIY+prolgrBh6tikiWFNXiWX8+:Ceh2+prOsz6ckZzSWX8+

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

a2d5

Decoy

theplam.com

kfmlegal.com

labottega.xyz

hhhtshg.com

kamerabudi.site

advancedsportz.com

hyperactive.life

mintyjazz.com

ashhpega.xyz

jbo.mobi

longthienvn.com

edwanflorist.com

sonyahfond.com

thezebraeffect.com

techgadgetssolutions.online

sekshikayeara.com

tavrida.xyz

vesulyo.xyz

pomegranatenoir.com

kaapcabins.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKM_C224e2104221317034443434434342244347.exe
    "C:\Users\Admin\AppData\Local\Temp\SKM_C224e2104221317034443434434342244347.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\SKM_C224e2104221317034443434434342244347.exe
      "C:\Users\Admin\AppData\Local\Temp\SKM_C224e2104221317034443434434342244347.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nstD4AE.tmp\pesaakdq.dll

    Filesize

    33KB

    MD5

    184b758268965aca6018f69dfe7d18d3

    SHA1

    3a25a53a14f5639ff368a33e8ec8a806d059c7eb

    SHA256

    a8d25a38820df99aa1b1be9dce4a30a99ec01c11287fe75cbdf02f8120e4935d

    SHA512

    aca7cee419ed6bd1bfe30f25d1cd59f8a5e98c88ba1c786e3f9b5814fd316d26d7e013ab6b85a475dddd598756ee4f3fea8027dbb693d54f6fd09e094cb65e85

  • memory/1440-9-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2372-7-0x0000000074FF7000-0x0000000074FF9000-memory.dmp

    Filesize

    8KB