Resubmissions

20-06-2024 08:53

240620-ktnxwstajj 10

12-06-2024 02:32

240612-c1j9aaygnn 10

Analysis

  • max time kernel
    134s
  • max time network
    135s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20-06-2024 08:53

General

  • Target

    f1f3c884481aea76a89cfc659e509789e243226118ee103c76dafd76d73aa839.exe

  • Size

    656KB

  • MD5

    58683f82a5c6a4b53e5eea6e3d2df375

  • SHA1

    5781f6d4918dfb0260444dcbaf040dee3ffc0319

  • SHA256

    f1f3c884481aea76a89cfc659e509789e243226118ee103c76dafd76d73aa839

  • SHA512

    df9e89ad721ccfbb730bf82aa67d07697358910dbb401457f66e344b0c74c59ca36c12bfb6e829243fcb92a7f28c23a6aa13b24a05ccea2be55769cfaf795611

  • SSDEEP

    12288:/aCR5leZlNkbMvoHsUjsKZN5eJL/LaG2GcZO6EoLNSB2dC:i+erGMwMf8neJL/+GK3d

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

38gc

Decoy

fgoz3kry51.asia

vanishingacthairremoval.com

onlinelearningsandbox.com

feluca-egypt.com

goforsourcing.com

hairmadeperfect.com

brockspaydayearners.com

vintagetoj.com

tjandthecampers.com

emkanelajiehes.com

bestundersinkwaterfilter.com

proatta777.com

satuslot.beauty

nicolesbodybutter.com

montecarlogallery.com

homeautomation.one

cx-n1.ink

spennys.casa

gaozgn.cfd

hakajimai.online

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1f3c884481aea76a89cfc659e509789e243226118ee103c76dafd76d73aa839.exe
    "C:\Users\Admin\AppData\Local\Temp\f1f3c884481aea76a89cfc659e509789e243226118ee103c76dafd76d73aa839.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Local\Temp\f1f3c884481aea76a89cfc659e509789e243226118ee103c76dafd76d73aa839.exe
      "C:\Users\Admin\AppData\Local\Temp\f1f3c884481aea76a89cfc659e509789e243226118ee103c76dafd76d73aa839.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2504

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2324-6-0x00000000058A0000-0x00000000058C2000-memory.dmp
    Filesize

    136KB

  • memory/2324-1-0x0000000000A30000-0x0000000000AD8000-memory.dmp
    Filesize

    672KB

  • memory/2324-2-0x00000000058D0000-0x0000000005DCE000-memory.dmp
    Filesize

    5.0MB

  • memory/2324-3-0x0000000005320000-0x00000000053B2000-memory.dmp
    Filesize

    584KB

  • memory/2324-4-0x0000000005490000-0x000000000549A000-memory.dmp
    Filesize

    40KB

  • memory/2324-5-0x00000000735E0000-0x0000000073CCE000-memory.dmp
    Filesize

    6.9MB

  • memory/2324-0-0x00000000735EE000-0x00000000735EF000-memory.dmp
    Filesize

    4KB

  • memory/2324-7-0x0000000002C20000-0x0000000002C30000-memory.dmp
    Filesize

    64KB

  • memory/2324-8-0x0000000009400000-0x0000000009476000-memory.dmp
    Filesize

    472KB

  • memory/2324-9-0x000000000C510000-0x000000000C5AC000-memory.dmp
    Filesize

    624KB

  • memory/2324-12-0x00000000735E0000-0x0000000073CCE000-memory.dmp
    Filesize

    6.9MB

  • memory/2504-10-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/2504-13-0x0000000001740000-0x0000000001A60000-memory.dmp
    Filesize

    3.1MB