Analysis

  • max time kernel
    360s
  • max time network
    361s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 00:53 UTC

General

  • Target

    6086e2101717fd208b1f2b27d236d242.exe

  • Size

    586KB

  • MD5

    6086e2101717fd208b1f2b27d236d242

  • SHA1

    b47eb5dad7656f4ea4f520bffa2df5217c611efb

  • SHA256

    712f4edfc3c0a1ad54060809bb9c39b0a1a355c8ebcb2cc377f100215a3f4150

  • SHA512

    63a7e54bfc1693cb8e818fb95e843fa8b791ef07996073326c944b702dd53e1cafd794bc46611836311e5e2b057684cef06998a40647cd0ba09ff4ea3da2f96d

  • SSDEEP

    12288:RfhpMHL/F+METLZNFKK/JFieyX7CXpCe9zJVGTP:gL/F+MEdV/JGrCXgeBJW

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

mj25

Decoy

resencepeople.net

okebowlkoning.online

owevrcast.store

ynursery.xyz

isefyxerprotech.info

nventrobots-br.xyz

rojetos3d.shop

confyxerengine.info

litdugunsalonu.xyz

uporexinaluvo.click

attwecan.net

r154359.xyz

airtidy.store

headvancestore.shop

urolube.xyz

apnovis.online

adychef.shop

armhouse.world

unspotgambit.top

nline-dating-for-now.today

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe
    "C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3012
    • C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe
      "C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"
      2⤵
        PID:2716
      • C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe
        "C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"
        2⤵
          PID:1776
        • C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe
          "C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:292

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/292-13-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/292-14-0x0000000000800000-0x0000000000B03000-memory.dmp

        Filesize

        3.0MB

      • memory/292-7-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/292-9-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/292-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/1840-3-0x00000000005D0000-0x00000000005E0000-memory.dmp

        Filesize

        64KB

      • memory/1840-6-0x0000000004DD0000-0x0000000004E48000-memory.dmp

        Filesize

        480KB

      • memory/1840-5-0x0000000074BE0000-0x00000000752CE000-memory.dmp

        Filesize

        6.9MB

      • memory/1840-4-0x0000000074BEE000-0x0000000074BEF000-memory.dmp

        Filesize

        4KB

      • memory/1840-0-0x0000000074BEE000-0x0000000074BEF000-memory.dmp

        Filesize

        4KB

      • memory/1840-2-0x0000000074BE0000-0x00000000752CE000-memory.dmp

        Filesize

        6.9MB

      • memory/1840-1-0x0000000000020000-0x00000000000B8000-memory.dmp

        Filesize

        608KB

      • memory/1840-17-0x0000000074BE0000-0x00000000752CE000-memory.dmp

        Filesize

        6.9MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.