Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 23:53
Static task
static1
Behavioral task
behavioral1
Sample
038159.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
038159.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/jaqxzro.dll
Resource
win7-20240221-en
General
-
Target
$PLUGINSDIR/jaqxzro.dll
-
Size
29KB
-
MD5
1e8aa5fcc0f7de7a0836081dd9efff05
-
SHA1
48317ef5f587f52fd34b42164dfb893dcde95e1b
-
SHA256
5389af7b3d0f5a3496cd2aa538a6ee01fd5a9bd1a8fcf3b9411f4112313d43af
-
SHA512
addd27d8923bf5d3f7d87e3eb2f6138d05532aa7c9340fde2f998a84fa87f227b63cd515176940de099d4f8dc46d1ab7467f4e347e266d0ef128d7337d79ea16
-
SSDEEP
384:IcOhNOWCf3iUgfews69swci/+9YFmtgqQzZQFORdP2NG6zZHZD24mYfVSUB+V6G4:DC9szi/MeqQqgRd2pZMbwjGANT5
Malware Config
Extracted
formbook
4.1
w6ya
auden-audio.com
zombieodyssey.com
hdpthg.com
toddtechnical.com
njsdgz.com
yieldfarm.world
guardsveirfynews.net
atmamandir.info
eskisehirtostcusu.online
arrozz.net
v99king.win
jaxonboxing.com
morganevans.net
syandeg.com
valleyofplants.com
corsosportorico.com
tak.support
blacktgpc.com
herdpetshop.com
iifkvhns.xyz
notredameapartmentsnh.com
sourcefogrge.net
fattails.net
hybridleadershiptheory.com
lyymbeautysalon.com
pnia8889789.com
hagklp.com
unmaskingyourheart.com
xcyweb.com
brokerdeck.com
firstmediainternet.biz.id
charlottelawrencecoaching.com
metyon.xyz
aceshiprecycling.net
site4education.com
lmecgpllc.com
glutenfreebud.com
fxy-9cc6.biz
smoothingcapacitors.com
acrylicblanktoppers.com
onetzrot.com
globalfibreimpact.com
idahod3marchingfestival.com
expediom.com
soupyz.com
baremetal.tools
malagacatalogo.com
fuzitavn.com
tnotchconsulting.com
rocfilings.online
belozza.com
razn.xyz
creatormike.com
mehmetatalay.xyz
nh-netsol23.com
muland.website
baishshop.com
newday-newbeginning.com
evautoscam.com
larasgifts.com
jalilcc.com
spiraentertainment.com
mirasms.online
clippingup.com
truth-capturemachine.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral4/memory/4256-1-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral4/memory/4256-5-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral4/memory/3428-10-0x0000000000930000-0x000000000095F000-memory.dmp formbook behavioral4/memory/3428-12-0x0000000000930000-0x000000000095F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4936 set thread context of 4256 4936 rundll32.exe 89 PID 4256 set thread context of 3476 4256 rundll32.exe 55 PID 3428 set thread context of 3476 3428 msdt.exe 55 -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 4256 rundll32.exe 4256 rundll32.exe 4256 rundll32.exe 4256 rundll32.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe 3428 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4256 rundll32.exe 4256 rundll32.exe 4256 rundll32.exe 3428 msdt.exe 3428 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4256 rundll32.exe Token: SeDebugPrivilege 3428 msdt.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3476 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3536 wrote to memory of 4936 3536 rundll32.exe 86 PID 3536 wrote to memory of 4936 3536 rundll32.exe 86 PID 3536 wrote to memory of 4936 3536 rundll32.exe 86 PID 4936 wrote to memory of 4256 4936 rundll32.exe 89 PID 4936 wrote to memory of 4256 4936 rundll32.exe 89 PID 4936 wrote to memory of 4256 4936 rundll32.exe 89 PID 4936 wrote to memory of 4256 4936 rundll32.exe 89 PID 4936 wrote to memory of 4256 4936 rundll32.exe 89 PID 4936 wrote to memory of 4256 4936 rundll32.exe 89 PID 3476 wrote to memory of 3428 3476 Explorer.EXE 90 PID 3476 wrote to memory of 3428 3476 Explorer.EXE 90 PID 3476 wrote to memory of 3428 3476 Explorer.EXE 90 PID 3428 wrote to memory of 648 3428 msdt.exe 93 PID 3428 wrote to memory of 648 3428 msdt.exe 93 PID 3428 wrote to memory of 648 3428 msdt.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jaqxzro.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jaqxzro.dll,#13⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jaqxzro.dll,#14⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵PID:648
-
-