Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 18:05
Static task
static1
Behavioral task
behavioral1
Sample
G-77904DOC.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
G-77904DOC.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
gavvjlio.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
gavvjlio.exe
Resource
win10v2004-20241007-en
General
-
Target
G-77904DOC.exe
-
Size
300KB
-
MD5
e133504aa7c92bcc8b358abfa4c36a20
-
SHA1
68a3dc52c35115003d74c224dfc3f9e95bd00c04
-
SHA256
58a064152959df9f0b10cb78b8cdcda6eae112619a7239ddc0c18547e7e3a598
-
SHA512
98b75db2b869e910565321e829689366be7f319cf6f3aaaac65d06a36b6985cbdec0e16261bfeb0f93b8a48d5b1c707ef28deb84430ccb738dff0699a3a5fd60
-
SSDEEP
6144:rGiwlK7jQRnqGFYtTJJr3+WZmHXH0CNK0d2Rr+oGJyRt1sy2:QcQxYtTbr1Z4/XZMwy2
Malware Config
Extracted
formbook
4.1
bs11
momentumcs.net
gifabricaciones.com
handwerks.design
kalviuniv.com
saatiin.com
anthonyjoelquezada.com
fantasticphoto.sbs
lifespanvisiontherapeutics.com
cameliaandco.com
loftycryphigh.com
webtrajpylive.online
perlerpalace.com
annemacedonia.com
oakandorange.com
arslantrader.com
nanhajim.com
ursula.biz
onlinebusiness.today
shishkin-grow.space
whoami.zone
boutique-carte-du-monde.com
corrupt-golf.com
timict.online
uzsia.com
aixuan-yun.com
cheapnowaaaa.com
adsdelight.com
bondcountydemocrats.com
klcgold.com
evehr.plus
greerfitness.com
shagpaz-dominant-products.com
hrtechuk.net
wholesalesolr.com
8dsculture.online
gestaosub.info
nealmcco.com
mediathingz.com
simplilp.com
neulogzakki.com
bibleandabudget.com
boryokudino.com
fjseducationaltrust.com
xodsyx.icu
pierrebaker.com
hydrofarmcostarica.com
undergradsuccesscoach.com
saatiin.com
xingzuo88.net
cruzinstyle.com
thechristiecompany.com
cmmelectric.com
danfranautopartes.com
enduraverse.com
americaneaglecom.com
brokejeep.com
starsincarz.com
thirdeyesociety.info
alainoasis.com
stationerystuff.store
ethicacapitalcorp.com
my-blablacar.info
benjaminwellenbeck.com
dynamicblendingspecalists.com
bradleyflooring.net
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/3068-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3068-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3044-21-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 2876 gavvjlio.exe 3068 gavvjlio.exe -
Loads dropped DLL 2 IoCs
pid Process 2776 G-77904DOC.exe 2876 gavvjlio.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2876 set thread context of 3068 2876 gavvjlio.exe 31 PID 3068 set thread context of 1188 3068 gavvjlio.exe 21 PID 3044 set thread context of 1188 3044 systray.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language G-77904DOC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gavvjlio.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3068 gavvjlio.exe 3068 gavvjlio.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe 3044 systray.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3068 gavvjlio.exe 3068 gavvjlio.exe 3068 gavvjlio.exe 3044 systray.exe 3044 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3068 gavvjlio.exe Token: SeDebugPrivilege 3044 systray.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2876 2776 G-77904DOC.exe 30 PID 2776 wrote to memory of 2876 2776 G-77904DOC.exe 30 PID 2776 wrote to memory of 2876 2776 G-77904DOC.exe 30 PID 2776 wrote to memory of 2876 2776 G-77904DOC.exe 30 PID 2876 wrote to memory of 3068 2876 gavvjlio.exe 31 PID 2876 wrote to memory of 3068 2876 gavvjlio.exe 31 PID 2876 wrote to memory of 3068 2876 gavvjlio.exe 31 PID 2876 wrote to memory of 3068 2876 gavvjlio.exe 31 PID 2876 wrote to memory of 3068 2876 gavvjlio.exe 31 PID 2876 wrote to memory of 3068 2876 gavvjlio.exe 31 PID 2876 wrote to memory of 3068 2876 gavvjlio.exe 31 PID 1188 wrote to memory of 3044 1188 Explorer.EXE 32 PID 1188 wrote to memory of 3044 1188 Explorer.EXE 32 PID 1188 wrote to memory of 3044 1188 Explorer.EXE 32 PID 1188 wrote to memory of 3044 1188 Explorer.EXE 32 PID 3044 wrote to memory of 1736 3044 systray.exe 33 PID 3044 wrote to memory of 1736 3044 systray.exe 33 PID 3044 wrote to memory of 1736 3044 systray.exe 33 PID 3044 wrote to memory of 1736 3044 systray.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\G-77904DOC.exe"C:\Users\Admin\AppData\Local\Temp\G-77904DOC.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\gavvjlio.exeC:\Users\Admin\AppData\Local\Temp\gavvjlio.exe C:\Users\Admin\AppData\Local\Temp\rudvuunoky3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\gavvjlio.exeC:\Users\Admin\AppData\Local\Temp\gavvjlio.exe C:\Users\Admin\AppData\Local\Temp\rudvuunoky4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\gavvjlio.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5a9a514cd5d9c755b8319c055b0d6d06e
SHA15717539cbc2ab9a7c01443182abfa50bb0520694
SHA256b53b25f3d0418c286e8d4c78fc4080ecd05f00bd6b39fa16241335bfc05670df
SHA51282f9978685f9877e20b24dd60bb32b05c3c23b54275c107cb7017a15f5802d1540ef10709ae90de0b0cef83e32c57c66063aa1db8f8ef7a6708a40d352d7ecf5
-
Filesize
4KB
MD5cd2d9713ae5995ee2bf3af08d8eecc52
SHA1c08cf6596eb17e3f52295cef79c51b67c86bf407
SHA256ad332e48b605d4d44a205c3bc93414696b372e08efdb9d423b69452a04db9e67
SHA512e3a5ce9c56ac429f6ab33c79b57580155173bdb9e2f010d952d32ee95e08db893004b6bf37e4665f112b3b2bb01210e71fb125a9772addbc9a9c985224ed3fb5
-
Filesize
107KB
MD54f1abaead61fe7411fc7c6ee5082d665
SHA1b4ad83dea14c06e0aa2c2ca582b52a527ec01d77
SHA256e6b54e61fb080c3f6efb98d3ac8d182ad859fee863cc43478c99d3660bec6bd5
SHA512e045f7094df1552776c1542edef3066663fcbfcf7dcd9bc871de273ce087c898aee583f603f34532d94e8ee22f86b550c736ab9232f72c2966cd62613dc5baab