Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2024 18:26

General

  • Target

    InvoiceFB1.exe

  • Size

    487KB

  • MD5

    cea9f8ab6f247ba9d68798b685bc5ebd

  • SHA1

    d02f86034c86efe9aa457306e76746e6df294115

  • SHA256

    5ac464b04f871540a52fb5c7e8349f1bd7856a9e6f6d63eadd61755637e7d1da

  • SHA512

    82ffe9ca68c189b6066e478c70d3b10d84bfd026988540ac4ce08ac58ece1f79789d362cbea2b779cb0a07ef50c4c4913328b98ac19aca43bfef4561e3e9f572

  • SSDEEP

    12288:nanrKibhvVp2ygaKNOALUMEaRjByWActJNc7pQzqmgY:UvbhvVhzKnLdB2QJkCoY

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

pw9

Decoy

applephone.red

bureauxfashion.com

05044444.com

newmarketingideas.net

7754y.com

976life.com

rilio.realty

amandakohar.com

003manbetx.com

tomtomxl.com

pulse-group.com

qdhtdzj.com

desitebuilder.com

ivymaephotography.info

sgpoloclub.com

aaeventsshop.com

mobilesant.com

lewismobilewelding.com

firefromthearchives.com

printathomeparties.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 2 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3452
    • C:\Users\Admin\AppData\Local\Temp\InvoiceFB1.exe
      "C:\Users\Admin\AppData\Local\Temp\InvoiceFB1.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe LigulaObloquy,Xerophytes
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2184
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe"
          4⤵
            PID:4064
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:4636
      • C:\Windows\SysWOW64\wlanext.exe
        "C:\Windows\SysWOW64\wlanext.exe"
        2⤵
        • Adds policy Run key to start application
        • Suspicious use of SetThreadContext
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4664
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\SysWOW64\cmd.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2460
        • C:\Windows\SysWOW64\cmd.exe
          /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3700
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:3436

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\DB1

        Filesize

        40KB

        MD5

        a182561a527f929489bf4b8f74f65cd7

        SHA1

        8cd6866594759711ea1836e86a5b7ca64ee8911f

        SHA256

        42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

        SHA512

        9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

      • C:\Users\Admin\AppData\Local\Temp\Jumpstart

        Filesize

        232KB

        MD5

        24c34d5b16162930fb64196afafd0e34

        SHA1

        26c94849c6af6154c1de2961182e7b58bbb0c08d

        SHA256

        bef1d5e34543ee442610285c6a255f80590edce10f2acbe31ce974d1e3a5a1cc

        SHA512

        05318f3ce77531a313b6f180e8dd43c4170cc1d3d59237e748924c35078aa9c2c7aa38256202f9672fe08cc89b27442a8431e7f46fb83ead6b043de3d7bbec82

      • C:\Users\Admin\AppData\Local\Temp\LigulaObloquy.DLL

        Filesize

        60KB

        MD5

        f97e874de0ecea97bb5f0e6747907143

        SHA1

        870ea315994cf0c5cac4c815de79cf86c0d114a6

        SHA256

        c9c153387c7f0d6f3476431e6878b6d455cc2ce0b6ff8afd83753970289ce387

        SHA512

        3dcd8066cd7ecc0b0b781a6f3a99f30296c4fc7d9e40502b43d685927a31f2cae611f4e22755505e0e720382badd256e7f2234f428c90b19c7820dd1727d4531

      • C:\Users\Admin\AppData\Roaming\-6480DD3\-64logim.jpeg

        Filesize

        86KB

        MD5

        d77ff720859f7e190bbdc9034bf9c3bb

        SHA1

        252cc8a68ddbf3345969dddf675b67769b20b830

        SHA256

        fd5b489990fa67cae026089462850774e6013347cfc32cb40e85de90bad142fc

        SHA512

        79634b3620e5f453b22b3cbe50a0d9a1b5011ed8e28c082041b5210385f51c0bac004638d7fc976c0411478e3a91644d5c9b7d813c267759b475d11daafa77e0

      • C:\Users\Admin\AppData\Roaming\-6480DD3\-64logrf.ini

        Filesize

        40B

        MD5

        2f245469795b865bdd1b956c23d7893d

        SHA1

        6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

        SHA256

        1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

        SHA512

        909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

      • C:\Users\Admin\AppData\Roaming\-6480DD3\-64logrg.ini

        Filesize

        38B

        MD5

        4aadf49fed30e4c9b3fe4a3dd6445ebe

        SHA1

        1e332822167c6f351b99615eada2c30a538ff037

        SHA256

        75034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56

        SHA512

        eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945

      • C:\Users\Admin\AppData\Roaming\-6480DD3\-64logri.ini

        Filesize

        40B

        MD5

        d63a82e5d81e02e399090af26db0b9cb

        SHA1

        91d0014c8f54743bba141fd60c9d963f869d76c9

        SHA256

        eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

        SHA512

        38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

      • C:\Users\Admin\AppData\Roaming\-6480DD3\-64logrv.ini

        Filesize

        872B

        MD5

        bbc41c78bae6c71e63cb544a6a284d94

        SHA1

        33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a

        SHA256

        ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb

        SHA512

        0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

      • memory/2184-46-0x0000000077370000-0x00000000773D3000-memory.dmp

        Filesize

        396KB

      • memory/2184-48-0x0000000074750000-0x0000000074818000-memory.dmp

        Filesize

        800KB

      • memory/2184-45-0x0000000074750000-0x0000000074818000-memory.dmp

        Filesize

        800KB

      • memory/2184-44-0x0000000001190000-0x0000000001192000-memory.dmp

        Filesize

        8KB

      • memory/3452-57-0x0000000008A50000-0x0000000008B57000-memory.dmp

        Filesize

        1.0MB

      • memory/4636-54-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/4636-50-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/4636-47-0x0000000000430000-0x0000000000436000-memory.dmp

        Filesize

        24KB

      • memory/4664-53-0x0000000000EA0000-0x0000000000EB7000-memory.dmp

        Filesize

        92KB

      • memory/4664-52-0x0000000000EA0000-0x0000000000EB7000-memory.dmp

        Filesize

        92KB