Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Win32.FormBook.AR.exe
Resource
win7-20240903-en
General
-
Target
Trojan.Win32.FormBook.AR.exe
-
Size
524KB
-
MD5
e125cbe585e654316d5ab0c2a73bd830
-
SHA1
62bf4c0a8fbd8a30663e468cf865b1c6e5f5a7bc
-
SHA256
7d9ccf7be546cdad2baab25c98336224ae050f477594647c9a8adf6b8700011a
-
SHA512
57d6ae7a7b4c13d23f0ac17a1a684a81155a4e233a107fc275e5d901db70dd4d246f7f746852d4bf4bfd17c522f0ef7e666e983f766c04248b885e044dcc704c
-
SSDEEP
12288:X9pL8dQnSsG5u8j/cYRHFuVP32+8AEDuME4lbMIOy:X9pL8dQnSsG5umRHFKD8AED+ibMXy
Malware Config
Extracted
xloader
2.3
ma3c
bensimonconstructions.com
margaretta.info
getreireply.com
jamierighetti.com
gxjljc.com
internet-exerzitien.com
appetiteintelligence.com
buscar-id-apple.com
unique-bikinis.com
enclassique.com
dafontonline.com
northamericancarbonexchange.com
yashasvsaluja.com
sn-international.com
humanvitality.site
sarahcasias.com
xn--vrv276h3cb.com
curiget.xyz
anxietyattackscure.com
angelstonecrystals.com
onestripemed.com
mirgran.com
boxtechtv.com
healthcontrol.net
eroutescheduling.com
betralifcannabis.com
advancefulfillmentcenter.net
graphicprofessor.com
booster-tresorerie.com
intibeso.xyz
modomo.amsterdam
rionaluo.net
6streeam.xyz
mobundlesco.com
sacredlight.store
xy4869.com
xn--casamio-9za.com
herma-shop.com
cfphoenixmembers.com
ssrpss.info
realunitystudio.com
itsjustinscode.com
wannabebody.com
bwbcoa.com
unitednations-office.com
dallasmalerevuetix.com
bestflowersandgifts.com
lojasmegamoveis.com
fyahvapes.com
salvofoods.com
meditationwithdaniel.com
2elden.com
romitoart.com
sci-mfg.com
xn--hy1bw5cd1ic1e75g84omki.com
erwinsiahaan.com
landreclaim.com
chuanyangwenhua.com
zzfuwusheji.com
cannabiss.clinic
sexichef.com
aymauxilia.com
conchcruiserswestpalm.com
rememberingedward.info
zq2003.com
Signatures
-
Xloader payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2076-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2076-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2076-5-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1324-15-0x0000000000B70000-0x0000000000B99000-memory.dmp xloader behavioral2/memory/1324-17-0x0000000000B70000-0x0000000000B99000-memory.dmp xloader -
Blocklisted process makes network request 1 IoCs
Processes:
msiexec.exeflow pid Process 53 1324 msiexec.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Trojan.Win32.FormBook.AR.exeTrojan.Win32.FormBook.AR.exemsiexec.exedescription pid Process procid_target PID 3100 set thread context of 2076 3100 Trojan.Win32.FormBook.AR.exe 86 PID 2076 set thread context of 3440 2076 Trojan.Win32.FormBook.AR.exe 56 PID 2076 set thread context of 3440 2076 Trojan.Win32.FormBook.AR.exe 56 PID 1324 set thread context of 3440 1324 msiexec.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Trojan.Win32.FormBook.AR.exeTrojan.Win32.FormBook.AR.exemsiexec.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.Win32.FormBook.AR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.Win32.FormBook.AR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
Trojan.Win32.FormBook.AR.exemsiexec.exepid Process 2076 Trojan.Win32.FormBook.AR.exe 2076 Trojan.Win32.FormBook.AR.exe 2076 Trojan.Win32.FormBook.AR.exe 2076 Trojan.Win32.FormBook.AR.exe 2076 Trojan.Win32.FormBook.AR.exe 2076 Trojan.Win32.FormBook.AR.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe 1324 msiexec.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Trojan.Win32.FormBook.AR.exemsiexec.exepid Process 2076 Trojan.Win32.FormBook.AR.exe 2076 Trojan.Win32.FormBook.AR.exe 2076 Trojan.Win32.FormBook.AR.exe 2076 Trojan.Win32.FormBook.AR.exe 1324 msiexec.exe 1324 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Trojan.Win32.FormBook.AR.exemsiexec.exedescription pid Process Token: SeDebugPrivilege 2076 Trojan.Win32.FormBook.AR.exe Token: SeDebugPrivilege 1324 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Trojan.Win32.FormBook.AR.exepid Process 3100 Trojan.Win32.FormBook.AR.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Trojan.Win32.FormBook.AR.exeTrojan.Win32.FormBook.AR.exemsiexec.exedescription pid Process procid_target PID 3100 wrote to memory of 2076 3100 Trojan.Win32.FormBook.AR.exe 86 PID 3100 wrote to memory of 2076 3100 Trojan.Win32.FormBook.AR.exe 86 PID 3100 wrote to memory of 2076 3100 Trojan.Win32.FormBook.AR.exe 86 PID 3100 wrote to memory of 2076 3100 Trojan.Win32.FormBook.AR.exe 86 PID 2076 wrote to memory of 1324 2076 Trojan.Win32.FormBook.AR.exe 90 PID 2076 wrote to memory of 1324 2076 Trojan.Win32.FormBook.AR.exe 90 PID 2076 wrote to memory of 1324 2076 Trojan.Win32.FormBook.AR.exe 90 PID 1324 wrote to memory of 2412 1324 msiexec.exe 91 PID 1324 wrote to memory of 2412 1324 msiexec.exe 91 PID 1324 wrote to memory of 2412 1324 msiexec.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.FormBook.AR.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.FormBook.AR.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.FormBook.AR.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.FormBook.AR.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"4⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.FormBook.AR.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-
-
-