Analysis

  • max time kernel
    147s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2024 17:36

General

  • Target

    PO.exe

  • Size

    228KB

  • MD5

    2593eef7b38e160b9697f2479fa8843f

  • SHA1

    25d4d88f321321fb5b2b316fd5dbcd5bb144daa1

  • SHA256

    b35de004189f271fe754dd614e5fbbc299425f5aca9ebf1f935bf26696964853

  • SHA512

    c5beb57aae9c18ca5d7d73954216abc6a07871666d08a654d7b5d8e1d25b0defe9ca66eee77325bed03870a39757c85df13f868472447369bd2903ba05336a21

  • SSDEEP

    6144:lPXIegRJRwlTL8+GiAUUv5hotXkpqfc9F40:aegRJ+q+b3kpqoj

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

dxe

Decoy

sardarfarm.com

959tremont.com

privat-livecam.net

ansel-homebakery.com

joysupermarket.com

peninsulamatchmakers.net

northsytyle.com

radioconexaoubermusic.com

relocatingrealtor.com

desyrnan.com

onlinehoortoestel.online

enpointe.online

rvvikings.com

paulpoirier.com

shitarpa.net

kerneis.net

rokitreach.com

essentiallygaia.com

prestiged.net

fuerzaagavera.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1240
      • C:\Users\Admin\AppData\Local\Temp\PO.exe
        "C:\Users\Admin\AppData\Local\Temp\PO.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2128
        • C:\Users\Admin\AppData\Local\Temp\PO.exe
          "C:\Users\Admin\AppData\Local\Temp\PO.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2152
          • C:\Windows\SysWOW64\svchost.exe
            "C:\Windows\SysWOW64\svchost.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3048
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Users\Admin\AppData\Local\Temp\PO.exe"
              5⤵
              • Deletes itself
              • System Location Discovery: System Language Discovery
              PID:2684
      • C:\Windows\SysWOW64\autoconv.exe
        "C:\Windows\SysWOW64\autoconv.exe"
        2⤵
          PID:2888

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\nst79D3.tmp\k5ig8v1xqqd111h.dll

        Filesize

        5KB

        MD5

        fe9e8afe6e228256eaf3065c403d87bb

        SHA1

        1d46976328242b9e4f37d994bc1f169ee1f4c112

        SHA256

        e2b161127954eb1373158a95ef083d1b00198fef933e9ad5a1496d82d9006b8b

        SHA512

        573399e2885f89f05e27de783ef286c79dab04ca4e942f62ccbbb40d61fc7ab80baa97b13948b719dcae785d5daa19e4aa23adb4922e9737e0ecbfc2a09ba4a5

      • memory/1240-12-0x0000000000010000-0x0000000000020000-memory.dmp

        Filesize

        64KB

      • memory/1240-13-0x0000000006AF0000-0x0000000006C57000-memory.dmp

        Filesize

        1.4MB

      • memory/1240-16-0x0000000006980000-0x0000000006A5B000-memory.dmp

        Filesize

        876KB

      • memory/1240-17-0x0000000006AF0000-0x0000000006C57000-memory.dmp

        Filesize

        1.4MB

      • memory/1240-23-0x0000000006980000-0x0000000006A5B000-memory.dmp

        Filesize

        876KB

      • memory/2128-8-0x0000000000300000-0x0000000000302000-memory.dmp

        Filesize

        8KB

      • memory/2152-9-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2152-11-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2152-15-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/3048-22-0x0000000000760000-0x0000000000768000-memory.dmp

        Filesize

        32KB

      • memory/3048-21-0x0000000000760000-0x0000000000768000-memory.dmp

        Filesize

        32KB