Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
Shiment PL.exe
Resource
win7-20240903-en
General
-
Target
Shiment PL.exe
-
Size
834KB
-
MD5
1f154fdeb1f182e8e2d4bc203b5ff1f2
-
SHA1
1950bff0632ad10bd951e0fd5d307b58874cfe9a
-
SHA256
aa95f30da548dae9304cea73e276f87fdab530186aec142eb83022f1f31f5cb6
-
SHA512
97dc6d4e23f3928f8895ea63fd1a62eb86e655f537a15876f398db9e392e6f786bbcbd042cdb3a2792bc289521b374bb7d31b858f90dd8b422a1f24c938136f6
-
SSDEEP
12288:4t6HU8+sP4RbSvdVU0ClncgtmQJrx0T5ssFrHIcEooF3ArxMf4XxQ:c83PmSvdV9Cc2m1NlboBAfXxQ
Malware Config
Extracted
formbook
4.1
tw7
prestige-reps.com
nhakhoaquoctesmile.com
sicumplex.com
in36972.com
hikoosbyheidi.com
rayinthecity.com
mjwestwoodphotography.com
radiopeek.com
attisit.com
hdcpos.com
xn--halise-1ua.com
bossroyale.com
blstd.com
wniversitet.com
bethumb.pro
romber.info
bergundy.com
kingscoop.com
antiquefactory.net
loiseaudejade.com
amgomedia.com
njdatian.com
excelfc.com
kosmetik-junkie.com
hpdankai.com
fitnessient.com
ohiocopywriter.com
natalia4carpinteriacouncil.com
mtkmusic.com
esl-ca.com
adventuredomewyo.com
thedharmaoflife.com
tikkastreet.com
thecalmkoala.com
ghienmall.com
aeguana.systems
ajengofun.com
swagggnenterprise.com
demolishblackmagic.com
bootleggerstrail.net
trungnguyen.company
boekhouderdestelbergen.com
supremegeneticsnursery.com
lalitradelines.com
wuerzmische.com
junk-service.com
everycases.net
priyaitaliya.com
wordofmouthhub.info
linuxmemes.com
veganfoodinlondon.com
testeinrichten.one
bancapmang.com
likesonyc.com
corpolesebakery.com
justtherapies.com
stranded.network
royalvictoryservices.com
danablueboutique.com
nichirenreader.com
ytjhcb.com
michaelmcmanusenergy.com
dyjsxs.com
tbporiginals.com
skybowls.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/580-14-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/580-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions Shiment PL.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools Shiment PL.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Shiment PL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Shiment PL.exe -
Deletes itself 1 IoCs
pid Process 816 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Shiment PL.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Shiment PL.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2884 set thread context of 580 2884 Shiment PL.exe 32 PID 580 set thread context of 1212 580 Shiment PL.exe 21 PID 2108 set thread context of 1212 2108 cmstp.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shiment PL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 580 Shiment PL.exe 580 Shiment PL.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe 2108 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 580 Shiment PL.exe 580 Shiment PL.exe 580 Shiment PL.exe 2108 cmstp.exe 2108 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 580 Shiment PL.exe Token: SeDebugPrivilege 2108 cmstp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2884 wrote to memory of 580 2884 Shiment PL.exe 32 PID 2884 wrote to memory of 580 2884 Shiment PL.exe 32 PID 2884 wrote to memory of 580 2884 Shiment PL.exe 32 PID 2884 wrote to memory of 580 2884 Shiment PL.exe 32 PID 2884 wrote to memory of 580 2884 Shiment PL.exe 32 PID 2884 wrote to memory of 580 2884 Shiment PL.exe 32 PID 2884 wrote to memory of 580 2884 Shiment PL.exe 32 PID 1212 wrote to memory of 2108 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2108 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2108 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2108 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2108 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2108 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2108 1212 Explorer.EXE 33 PID 2108 wrote to memory of 816 2108 cmstp.exe 34 PID 2108 wrote to memory of 816 2108 cmstp.exe 34 PID 2108 wrote to memory of 816 2108 cmstp.exe 34 PID 2108 wrote to memory of 816 2108 cmstp.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Shiment PL.exe"C:\Users\Admin\AppData\Local\Temp\Shiment PL.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Shiment PL.exe"C:\Users\Admin\AppData\Local\Temp\Shiment PL.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Shiment PL.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:816
-
-