Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
Shiment PL.exe
Resource
win7-20240903-en
General
-
Target
Shiment PL.exe
-
Size
834KB
-
MD5
1f154fdeb1f182e8e2d4bc203b5ff1f2
-
SHA1
1950bff0632ad10bd951e0fd5d307b58874cfe9a
-
SHA256
aa95f30da548dae9304cea73e276f87fdab530186aec142eb83022f1f31f5cb6
-
SHA512
97dc6d4e23f3928f8895ea63fd1a62eb86e655f537a15876f398db9e392e6f786bbcbd042cdb3a2792bc289521b374bb7d31b858f90dd8b422a1f24c938136f6
-
SSDEEP
12288:4t6HU8+sP4RbSvdVU0ClncgtmQJrx0T5ssFrHIcEooF3ArxMf4XxQ:c83PmSvdV9Cc2m1NlboBAfXxQ
Malware Config
Extracted
formbook
4.1
tw7
prestige-reps.com
nhakhoaquoctesmile.com
sicumplex.com
in36972.com
hikoosbyheidi.com
rayinthecity.com
mjwestwoodphotography.com
radiopeek.com
attisit.com
hdcpos.com
xn--halise-1ua.com
bossroyale.com
blstd.com
wniversitet.com
bethumb.pro
romber.info
bergundy.com
kingscoop.com
antiquefactory.net
loiseaudejade.com
amgomedia.com
njdatian.com
excelfc.com
kosmetik-junkie.com
hpdankai.com
fitnessient.com
ohiocopywriter.com
natalia4carpinteriacouncil.com
mtkmusic.com
esl-ca.com
adventuredomewyo.com
thedharmaoflife.com
tikkastreet.com
thecalmkoala.com
ghienmall.com
aeguana.systems
ajengofun.com
swagggnenterprise.com
demolishblackmagic.com
bootleggerstrail.net
trungnguyen.company
boekhouderdestelbergen.com
supremegeneticsnursery.com
lalitradelines.com
wuerzmische.com
junk-service.com
everycases.net
priyaitaliya.com
wordofmouthhub.info
linuxmemes.com
veganfoodinlondon.com
testeinrichten.one
bancapmang.com
likesonyc.com
corpolesebakery.com
justtherapies.com
stranded.network
royalvictoryservices.com
danablueboutique.com
nichirenreader.com
ytjhcb.com
michaelmcmanusenergy.com
dyjsxs.com
tbporiginals.com
skybowls.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1708-14-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1708-19-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1708-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions Shiment PL.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools Shiment PL.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Shiment PL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Shiment PL.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Shiment PL.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Shiment PL.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2456 set thread context of 1708 2456 Shiment PL.exe 100 PID 1708 set thread context of 3444 1708 Shiment PL.exe 56 PID 1708 set thread context of 3444 1708 Shiment PL.exe 56 PID 4016 set thread context of 3444 4016 cmmon32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shiment PL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1708 Shiment PL.exe 1708 Shiment PL.exe 1708 Shiment PL.exe 1708 Shiment PL.exe 1708 Shiment PL.exe 1708 Shiment PL.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe 4016 cmmon32.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1708 Shiment PL.exe 1708 Shiment PL.exe 1708 Shiment PL.exe 1708 Shiment PL.exe 4016 cmmon32.exe 4016 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1708 Shiment PL.exe Token: SeDebugPrivilege 4016 cmmon32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2456 wrote to memory of 1708 2456 Shiment PL.exe 100 PID 2456 wrote to memory of 1708 2456 Shiment PL.exe 100 PID 2456 wrote to memory of 1708 2456 Shiment PL.exe 100 PID 2456 wrote to memory of 1708 2456 Shiment PL.exe 100 PID 2456 wrote to memory of 1708 2456 Shiment PL.exe 100 PID 2456 wrote to memory of 1708 2456 Shiment PL.exe 100 PID 3444 wrote to memory of 4016 3444 Explorer.EXE 101 PID 3444 wrote to memory of 4016 3444 Explorer.EXE 101 PID 3444 wrote to memory of 4016 3444 Explorer.EXE 101 PID 4016 wrote to memory of 3848 4016 cmmon32.exe 103 PID 4016 wrote to memory of 3848 4016 cmmon32.exe 103 PID 4016 wrote to memory of 3848 4016 cmmon32.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\Shiment PL.exe"C:\Users\Admin\AppData\Local\Temp\Shiment PL.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Shiment PL.exe"C:\Users\Admin\AppData\Local\Temp\Shiment PL.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Shiment PL.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3848
-
-