Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 08:42
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Win32.FormBook.AR.exe
Resource
win7-20240903-en
General
-
Target
Trojan.Win32.FormBook.AR.exe
-
Size
524KB
-
MD5
e125cbe585e654316d5ab0c2a73bd830
-
SHA1
62bf4c0a8fbd8a30663e468cf865b1c6e5f5a7bc
-
SHA256
7d9ccf7be546cdad2baab25c98336224ae050f477594647c9a8adf6b8700011a
-
SHA512
57d6ae7a7b4c13d23f0ac17a1a684a81155a4e233a107fc275e5d901db70dd4d246f7f746852d4bf4bfd17c522f0ef7e666e983f766c04248b885e044dcc704c
-
SSDEEP
12288:X9pL8dQnSsG5u8j/cYRHFuVP32+8AEDuME4lbMIOy:X9pL8dQnSsG5umRHFKD8AED+ibMXy
Malware Config
Extracted
xloader
2.3
ma3c
bensimonconstructions.com
margaretta.info
getreireply.com
jamierighetti.com
gxjljc.com
internet-exerzitien.com
appetiteintelligence.com
buscar-id-apple.com
unique-bikinis.com
enclassique.com
dafontonline.com
northamericancarbonexchange.com
yashasvsaluja.com
sn-international.com
humanvitality.site
sarahcasias.com
xn--vrv276h3cb.com
curiget.xyz
anxietyattackscure.com
angelstonecrystals.com
onestripemed.com
mirgran.com
boxtechtv.com
healthcontrol.net
eroutescheduling.com
betralifcannabis.com
advancefulfillmentcenter.net
graphicprofessor.com
booster-tresorerie.com
intibeso.xyz
modomo.amsterdam
rionaluo.net
6streeam.xyz
mobundlesco.com
sacredlight.store
xy4869.com
xn--casamio-9za.com
herma-shop.com
cfphoenixmembers.com
ssrpss.info
realunitystudio.com
itsjustinscode.com
wannabebody.com
bwbcoa.com
unitednations-office.com
dallasmalerevuetix.com
bestflowersandgifts.com
lojasmegamoveis.com
fyahvapes.com
salvofoods.com
meditationwithdaniel.com
2elden.com
romitoart.com
sci-mfg.com
xn--hy1bw5cd1ic1e75g84omki.com
erwinsiahaan.com
landreclaim.com
chuanyangwenhua.com
zzfuwusheji.com
cannabiss.clinic
sexichef.com
aymauxilia.com
conchcruiserswestpalm.com
rememberingedward.info
zq2003.com
Signatures
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/1704-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1704-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4548-8-0x0000000000460000-0x0000000000489000-memory.dmp xloader -
Blocklisted process makes network request 1 IoCs
flow pid Process 41 4548 rundll32.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3224 set thread context of 1704 3224 Trojan.Win32.FormBook.AR.exe 86 PID 1704 set thread context of 3612 1704 Trojan.Win32.FormBook.AR.exe 56 PID 4548 set thread context of 3612 4548 rundll32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.Win32.FormBook.AR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1704 Trojan.Win32.FormBook.AR.exe 1704 Trojan.Win32.FormBook.AR.exe 1704 Trojan.Win32.FormBook.AR.exe 1704 Trojan.Win32.FormBook.AR.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe 4548 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1704 Trojan.Win32.FormBook.AR.exe 1704 Trojan.Win32.FormBook.AR.exe 1704 Trojan.Win32.FormBook.AR.exe 4548 rundll32.exe 4548 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1704 Trojan.Win32.FormBook.AR.exe Token: SeDebugPrivilege 4548 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3224 Trojan.Win32.FormBook.AR.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3224 wrote to memory of 1704 3224 Trojan.Win32.FormBook.AR.exe 86 PID 3224 wrote to memory of 1704 3224 Trojan.Win32.FormBook.AR.exe 86 PID 3224 wrote to memory of 1704 3224 Trojan.Win32.FormBook.AR.exe 86 PID 3224 wrote to memory of 1704 3224 Trojan.Win32.FormBook.AR.exe 86 PID 3612 wrote to memory of 4548 3612 Explorer.EXE 87 PID 3612 wrote to memory of 4548 3612 Explorer.EXE 87 PID 3612 wrote to memory of 4548 3612 Explorer.EXE 87 PID 4548 wrote to memory of 3076 4548 rundll32.exe 89 PID 4548 wrote to memory of 3076 4548 rundll32.exe 89 PID 4548 wrote to memory of 3076 4548 rundll32.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.FormBook.AR.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.FormBook.AR.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.FormBook.AR.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.FormBook.AR.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.FormBook.AR.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3076
-
-