Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
ad43937eb3ac4cfd6bd460642102eafdd1d2007bdbd369e3db624613284c325c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ad43937eb3ac4cfd6bd460642102eafdd1d2007bdbd369e3db624613284c325c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/gtlbztpsztf.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/gtlbztpsztf.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/gtlbztpsztf.dll
-
Size
49KB
-
MD5
6432c43cc5cb60bb4a484470e8693ab3
-
SHA1
78f0e1e34dbee0fee48d70949ff07deef94215bc
-
SHA256
e21a1e1f87a1c05b1c97688f72fce20e5f1c42f8579b49d189b3e06f3be8a735
-
SHA512
760c3906675ca690b23e195a7b4c295289dc6242e096ca3140fc199e41474fff7df0500243bde937e4e5ab311d2c4969f02b8b3d87b97bd26d3c3feee5a5ef6e
-
SSDEEP
768:M57MzH3v2IihsP+l1nrk2IJ1/95UrpRxKZfUJXeykaxLT+QZv6qCGb:M57ohP+l1rktZ5qpWZf0XeyVxDd6/Gb
Malware Config
Extracted
formbook
4.1
s3dy
ravlygte.info
marketnewsville.online
flooring-envy.com
flavourhouston.com
donghohanghieunam.com
globleitsolutions.com
digitalgraphicarts.com
cupidbeautybar.com
cannavybes.com
negative-dsp.com
littledali.com
meltwatersoftware.info
blackdogland.com
danasales.com
mississippiscorecard.com
mainesmoker.com
sirenxinlilzixun.com
tychehang.com
gentciu.com
weckloltd.com
posy-socks.com
smp2kroya.com
clientacceleratorchallenge.com
erlacollection.com
027tvs.com
thisdw.com
nonosmell-store.site
underadress.com
principal.properties
ministyles123.com
readtohappiness.com
roostercollection.com
veteransinfrastructureparks.com
theminiverse.com
auto-expresss.club
ciaokitchenandbath.com
sbsfresh.com
onesheart111.com
artofquiet.info
atecwtec.com
scars-finder.online
luckbaanasset.com
vegaguzmanstudio.com
destinedtowander.com
genesaloe.info
shirewindowcleaning.com
dwadawdf001.com
mividaurbana.com
outsiders.house
secondhandcare.club
1031exchangeintoreit.com
zenyoustore.com
bahissikayetvar.net
platforms.trade
dasmusstduhaben.com
frankplex.design
thesiblingsoiree.com
18sdsd.com
oneninelacrosse.com
hdsllawfirm.com
rawrequest.com
jetsetterlifestyle.luxury
karenmendell.com
aspydad.com
livelifevibrantcourse.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral3/memory/2408-1-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral3/memory/2408-4-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1508 set thread context of 2408 1508 rundll32.exe rundll32.exe PID 2408 set thread context of 1120 2408 rundll32.exe Explorer.EXE -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2700 2816 WerFault.exe msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exerundll32.exemsiexec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 2408 rundll32.exe 2408 rundll32.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
rundll32.exepid process 2408 rundll32.exe 2408 rundll32.exe 2408 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
rundll32.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2408 rundll32.exe Token: SeShutdownPrivilege 1120 Explorer.EXE Token: SeShutdownPrivilege 1120 Explorer.EXE Token: SeShutdownPrivilege 1120 Explorer.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
rundll32.exerundll32.exeExplorer.EXEmsiexec.exedescription pid process target process PID 3056 wrote to memory of 1508 3056 rundll32.exe rundll32.exe PID 3056 wrote to memory of 1508 3056 rundll32.exe rundll32.exe PID 3056 wrote to memory of 1508 3056 rundll32.exe rundll32.exe PID 3056 wrote to memory of 1508 3056 rundll32.exe rundll32.exe PID 3056 wrote to memory of 1508 3056 rundll32.exe rundll32.exe PID 3056 wrote to memory of 1508 3056 rundll32.exe rundll32.exe PID 3056 wrote to memory of 1508 3056 rundll32.exe rundll32.exe PID 1508 wrote to memory of 2408 1508 rundll32.exe rundll32.exe PID 1508 wrote to memory of 2408 1508 rundll32.exe rundll32.exe PID 1508 wrote to memory of 2408 1508 rundll32.exe rundll32.exe PID 1508 wrote to memory of 2408 1508 rundll32.exe rundll32.exe PID 1508 wrote to memory of 2408 1508 rundll32.exe rundll32.exe PID 1508 wrote to memory of 2408 1508 rundll32.exe rundll32.exe PID 1508 wrote to memory of 2408 1508 rundll32.exe rundll32.exe PID 1508 wrote to memory of 2408 1508 rundll32.exe rundll32.exe PID 1508 wrote to memory of 2408 1508 rundll32.exe rundll32.exe PID 1508 wrote to memory of 2408 1508 rundll32.exe rundll32.exe PID 1120 wrote to memory of 2816 1120 Explorer.EXE msiexec.exe PID 1120 wrote to memory of 2816 1120 Explorer.EXE msiexec.exe PID 1120 wrote to memory of 2816 1120 Explorer.EXE msiexec.exe PID 1120 wrote to memory of 2816 1120 Explorer.EXE msiexec.exe PID 1120 wrote to memory of 2816 1120 Explorer.EXE msiexec.exe PID 1120 wrote to memory of 2816 1120 Explorer.EXE msiexec.exe PID 1120 wrote to memory of 2816 1120 Explorer.EXE msiexec.exe PID 2816 wrote to memory of 2700 2816 msiexec.exe WerFault.exe PID 2816 wrote to memory of 2700 2816 msiexec.exe WerFault.exe PID 2816 wrote to memory of 2700 2816 msiexec.exe WerFault.exe PID 2816 wrote to memory of 2700 2816 msiexec.exe WerFault.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gtlbztpsztf.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gtlbztpsztf.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gtlbztpsztf.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 2683⤵
- Program crash
PID:2700
-
-