Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2025 20:52

General

  • Target

    RFQ PC25-1301 Product Specifications_PDF.exe

  • Size

    1.7MB

  • MD5

    01b5875dce3957e3aa4a407551e2c4ba

  • SHA1

    96e0fb3b858c9f28445955b8cee19e698d44f815

  • SHA256

    fe242ebf2305cc96041ef027f7cdad6efe3ba1cf3aab07bb37357359452205d4

  • SHA512

    c00aa40db746e6074d0bbad6c14dc840b32e53c12a484405c7b95912bcf056eb47b3fc7b110beb57d1a8e6c9f90e480a55a7be930d2ca2caf03fec6f31e06f7f

  • SSDEEP

    24576:sqDEvCTbMWu7rQYlBQcBiT6rprG8at6FWvjTrmY44PhUY1sooWNf/w:sTvC/MTQYxsWR7aYFWvjTax4Jve

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

hwu6

Decoy

lf758.vip

locerin-hair.shop

vytech.net

pet-insurance-intl-7990489.live

thepolithat.buzz

d66dr114gl.bond

suv-deals-49508.bond

job-offer-53922.bond

drstone1.click

lebahsemesta57.click

olmanihousel.shop

piedmontcsb.info

trisula888x.top

66sodovna.net

dental-implants-83810.bond

imxtld.club

frozenpines.net

ffgzgbl.xyz

tlc7z.rest

alexismuller.design

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3452
      • C:\Users\Admin\AppData\Local\Temp\RFQ PC25-1301 Product Specifications_PDF.exe
        "C:\Users\Admin\AppData\Local\Temp\RFQ PC25-1301 Product Specifications_PDF.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2124
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\RFQ PC25-1301 Product Specifications_PDF.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4088
          • C:\Windows\SysWOW64\autofmt.exe
            "C:\Windows\SysWOW64\autofmt.exe"
            4⤵
              PID:3648
            • C:\Windows\SysWOW64\autofmt.exe
              "C:\Windows\SysWOW64\autofmt.exe"
              4⤵
                PID:396
              • C:\Windows\SysWOW64\autofmt.exe
                "C:\Windows\SysWOW64\autofmt.exe"
                4⤵
                  PID:3960
                • C:\Windows\SysWOW64\autofmt.exe
                  "C:\Windows\SysWOW64\autofmt.exe"
                  4⤵
                    PID:4912
                  • C:\Windows\SysWOW64\autochk.exe
                    "C:\Windows\SysWOW64\autochk.exe"
                    4⤵
                      PID:3776
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\SysWOW64\rundll32.exe"
                      4⤵
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2936
                      • C:\Windows\SysWOW64\cmd.exe
                        /c del "C:\Windows\SysWOW64\svchost.exe"
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:4340

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/2124-2-0x0000000001760000-0x0000000001B60000-memory.dmp

                Filesize

                4.0MB

              • memory/2936-17-0x0000000000360000-0x0000000000374000-memory.dmp

                Filesize

                80KB

              • memory/2936-19-0x0000000000850000-0x000000000087F000-memory.dmp

                Filesize

                188KB

              • memory/2936-15-0x0000000000360000-0x0000000000374000-memory.dmp

                Filesize

                80KB

              • memory/3452-25-0x0000000008380000-0x000000000845C000-memory.dmp

                Filesize

                880KB

              • memory/3452-23-0x0000000008380000-0x000000000845C000-memory.dmp

                Filesize

                880KB

              • memory/3452-22-0x0000000008380000-0x000000000845C000-memory.dmp

                Filesize

                880KB

              • memory/3452-9-0x0000000004150000-0x0000000004230000-memory.dmp

                Filesize

                896KB

              • memory/3452-13-0x0000000007DB0000-0x0000000007E63000-memory.dmp

                Filesize

                716KB

              • memory/3452-18-0x0000000007DB0000-0x0000000007E63000-memory.dmp

                Filesize

                716KB

              • memory/3452-14-0x0000000004150000-0x0000000004230000-memory.dmp

                Filesize

                896KB

              • memory/4088-7-0x00000000004D0000-0x00000000004FF000-memory.dmp

                Filesize

                188KB

              • memory/4088-11-0x00000000004D0000-0x00000000004FF000-memory.dmp

                Filesize

                188KB

              • memory/4088-12-0x0000000002C20000-0x0000000002C34000-memory.dmp

                Filesize

                80KB

              • memory/4088-8-0x0000000001350000-0x0000000001364000-memory.dmp

                Filesize

                80KB

              • memory/4088-6-0x0000000001000000-0x000000000134A000-memory.dmp

                Filesize

                3.3MB

              • memory/4088-3-0x00000000004D0000-0x00000000004FF000-memory.dmp

                Filesize

                188KB