Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 14:17
Static task
static1
Behavioral task
behavioral1
Sample
S12GF803.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
S12GF803.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/gtrvk.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/gtrvk.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/gtrvk.dll
-
Size
5KB
-
MD5
3627e0a769af64650e5ce46db6bb0532
-
SHA1
e203eaa9b1ad5d324af6696f5d1a62cd58e3513a
-
SHA256
a5699137065d3f0f5a26372a17eecc76905599435d866608f10c38760eb43e52
-
SHA512
044cb6198c848e4edd870fc9a5647e6a4644753986f2557da0babb0c9004ca14031b93c4db92d84754a297619bb87bdb6f847a3887c037180df4603583b908d1
-
SSDEEP
96:q6nmydg7sZIu+kYVz2LIu+3PSehGfZSfl59CC:B1dvIH+I+e6AfR
Malware Config
Extracted
formbook
4.1
sl12
monsore-records.com
discoverthis.world
ishop-brasil.com
foxeshaveholesintl.com
currenteitherknowledge.xyz
haaph.com
leggacyfarm.com
theaudiobookdb.net
ungerstahlbaubrehna.com
cliphindi.com
thht86.com
b4d5h0t.com
yashentcbsmall.com
ltcibenefits.com
allwaystravelservice.com
1gethear.com
elstery.com
buyervalet.com
snowyrangecpa.com
bshuan.icu
trapiantocapelliospedale.com
nexuscenterofevents.com
theglobalwellnessclub.com
computer-leasing-abtex.com
antwerpdogtrail.com
sulino.xyz
nomadabeans.com
tamarackshome.com
rjtsx.xyz
niuwangmuye.com
littlestdreams.com
xn--jstartcnon-y4a8j.com
3xkskd67.xyz
progresoinvestments.com
marciahawkin.com
zm6umsnd.xyz
mayofflor.com
v-spirits-consulting.com
iluvbxrs.com
vinilos.xyz
brandao.design
mendocinoblog.com
goodmandieselrepair.com
demonionft.com
jmecha.com
vendprograms.com
bizismart.com
aiorefunds.com
blockchainpublictrust.com
panalobet888.com
milanoovest.com
ipssml.com
plugin-app.com
sua36arf.xyz
pictures-planet.com
mljo.xyz
cashforsliverusa.com
inflrhub.com
taksnus.com
diyoutdoorsurvival.com
n73955.com
manisjelita.com
chanelprada.net
voq-products.com
seasonail.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral3/memory/2720-1-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/2720-4-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/2848-9-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2684 set thread context of 2720 2684 rundll32.exe 31 PID 2720 set thread context of 1192 2720 rundll32.exe 21 PID 2848 set thread context of 1192 2848 chkdsk.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2720 rundll32.exe 2720 rundll32.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe 2848 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2720 rundll32.exe 2720 rundll32.exe 2720 rundll32.exe 2848 chkdsk.exe 2848 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2720 rundll32.exe Token: SeDebugPrivilege 2848 chkdsk.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2684 2192 rundll32.exe 30 PID 2192 wrote to memory of 2684 2192 rundll32.exe 30 PID 2192 wrote to memory of 2684 2192 rundll32.exe 30 PID 2192 wrote to memory of 2684 2192 rundll32.exe 30 PID 2192 wrote to memory of 2684 2192 rundll32.exe 30 PID 2192 wrote to memory of 2684 2192 rundll32.exe 30 PID 2192 wrote to memory of 2684 2192 rundll32.exe 30 PID 2684 wrote to memory of 2720 2684 rundll32.exe 31 PID 2684 wrote to memory of 2720 2684 rundll32.exe 31 PID 2684 wrote to memory of 2720 2684 rundll32.exe 31 PID 2684 wrote to memory of 2720 2684 rundll32.exe 31 PID 2684 wrote to memory of 2720 2684 rundll32.exe 31 PID 2684 wrote to memory of 2720 2684 rundll32.exe 31 PID 2684 wrote to memory of 2720 2684 rundll32.exe 31 PID 2684 wrote to memory of 2720 2684 rundll32.exe 31 PID 2684 wrote to memory of 2720 2684 rundll32.exe 31 PID 2684 wrote to memory of 2720 2684 rundll32.exe 31 PID 1192 wrote to memory of 2848 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2848 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2848 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2848 1192 Explorer.EXE 32 PID 2848 wrote to memory of 2692 2848 chkdsk.exe 33 PID 2848 wrote to memory of 2692 2848 chkdsk.exe 33 PID 2848 wrote to memory of 2692 2848 chkdsk.exe 33 PID 2848 wrote to memory of 2692 2848 chkdsk.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gtrvk.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gtrvk.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gtrvk.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-