Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 08:42
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Win32.FormBook.AR.exe
Resource
win7-20240903-en
General
-
Target
Trojan.Win32.FormBook.AR.exe
-
Size
524KB
-
MD5
e125cbe585e654316d5ab0c2a73bd830
-
SHA1
62bf4c0a8fbd8a30663e468cf865b1c6e5f5a7bc
-
SHA256
7d9ccf7be546cdad2baab25c98336224ae050f477594647c9a8adf6b8700011a
-
SHA512
57d6ae7a7b4c13d23f0ac17a1a684a81155a4e233a107fc275e5d901db70dd4d246f7f746852d4bf4bfd17c522f0ef7e666e983f766c04248b885e044dcc704c
-
SSDEEP
12288:X9pL8dQnSsG5u8j/cYRHFuVP32+8AEDuME4lbMIOy:X9pL8dQnSsG5umRHFKD8AED+ibMXy
Malware Config
Extracted
xloader
2.3
ma3c
bensimonconstructions.com
margaretta.info
getreireply.com
jamierighetti.com
gxjljc.com
internet-exerzitien.com
appetiteintelligence.com
buscar-id-apple.com
unique-bikinis.com
enclassique.com
dafontonline.com
northamericancarbonexchange.com
yashasvsaluja.com
sn-international.com
humanvitality.site
sarahcasias.com
xn--vrv276h3cb.com
curiget.xyz
anxietyattackscure.com
angelstonecrystals.com
onestripemed.com
mirgran.com
boxtechtv.com
healthcontrol.net
eroutescheduling.com
betralifcannabis.com
advancefulfillmentcenter.net
graphicprofessor.com
booster-tresorerie.com
intibeso.xyz
modomo.amsterdam
rionaluo.net
6streeam.xyz
mobundlesco.com
sacredlight.store
xy4869.com
xn--casamio-9za.com
herma-shop.com
cfphoenixmembers.com
ssrpss.info
realunitystudio.com
itsjustinscode.com
wannabebody.com
bwbcoa.com
unitednations-office.com
dallasmalerevuetix.com
bestflowersandgifts.com
lojasmegamoveis.com
fyahvapes.com
salvofoods.com
meditationwithdaniel.com
2elden.com
romitoart.com
sci-mfg.com
xn--hy1bw5cd1ic1e75g84omki.com
erwinsiahaan.com
landreclaim.com
chuanyangwenhua.com
zzfuwusheji.com
cannabiss.clinic
sexichef.com
aymauxilia.com
conchcruiserswestpalm.com
rememberingedward.info
zq2003.com
Signatures
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2096-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2096-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2664-8-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2760 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Trojan.Win32.FormBook.AR.exeTrojan.Win32.FormBook.AR.execmd.exedescription pid Process procid_target PID 3028 set thread context of 2096 3028 Trojan.Win32.FormBook.AR.exe 30 PID 2096 set thread context of 1196 2096 Trojan.Win32.FormBook.AR.exe 21 PID 2664 set thread context of 1196 2664 cmd.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.exeTrojan.Win32.FormBook.AR.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.Win32.FormBook.AR.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
Trojan.Win32.FormBook.AR.execmd.exepid Process 2096 Trojan.Win32.FormBook.AR.exe 2096 Trojan.Win32.FormBook.AR.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Trojan.Win32.FormBook.AR.execmd.exepid Process 2096 Trojan.Win32.FormBook.AR.exe 2096 Trojan.Win32.FormBook.AR.exe 2096 Trojan.Win32.FormBook.AR.exe 2664 cmd.exe 2664 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Trojan.Win32.FormBook.AR.execmd.exedescription pid Process Token: SeDebugPrivilege 2096 Trojan.Win32.FormBook.AR.exe Token: SeDebugPrivilege 2664 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Trojan.Win32.FormBook.AR.exepid Process 3028 Trojan.Win32.FormBook.AR.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Trojan.Win32.FormBook.AR.exeExplorer.EXEcmd.exedescription pid Process procid_target PID 3028 wrote to memory of 2096 3028 Trojan.Win32.FormBook.AR.exe 30 PID 3028 wrote to memory of 2096 3028 Trojan.Win32.FormBook.AR.exe 30 PID 3028 wrote to memory of 2096 3028 Trojan.Win32.FormBook.AR.exe 30 PID 3028 wrote to memory of 2096 3028 Trojan.Win32.FormBook.AR.exe 30 PID 3028 wrote to memory of 2096 3028 Trojan.Win32.FormBook.AR.exe 30 PID 1196 wrote to memory of 2664 1196 Explorer.EXE 36 PID 1196 wrote to memory of 2664 1196 Explorer.EXE 36 PID 1196 wrote to memory of 2664 1196 Explorer.EXE 36 PID 1196 wrote to memory of 2664 1196 Explorer.EXE 36 PID 2664 wrote to memory of 2760 2664 cmd.exe 37 PID 2664 wrote to memory of 2760 2664 cmd.exe 37 PID 2664 wrote to memory of 2760 2664 cmd.exe 37 PID 2664 wrote to memory of 2760 2664 cmd.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.FormBook.AR.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.FormBook.AR.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.FormBook.AR.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.FormBook.AR.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2984
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2240
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2436
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1536
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.FormBook.AR.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2760
-
-