Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
336a2648e0811ebd11a94bb59c5cd5ea06ff48485f734ce149a3f9f9a7e0c7f4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
336a2648e0811ebd11a94bb59c5cd5ea06ff48485f734ce149a3f9f9a7e0c7f4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/pibyjvpg.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/pibyjvpg.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/pibyjvpg.dll
-
Size
31KB
-
MD5
7e38c9c4dae24727bfc89d6feba8cb3e
-
SHA1
53500d0d0b8921fe6690dbdd2009be6d9c06adc6
-
SHA256
087ed293380602e60c32df98be8412bd73d32beba232bc255a6fb3edf46134ff
-
SHA512
835412fa1c001a1ec811a51be9afc361cea9ec8db8a85912bf7007b20f74b338323b59ac637a1cfc9afebdf57c6a441680c0707d15c13c7560eaacc94a56a985
-
SSDEEP
768:ZMFszi/lKK6Q4JEdfK2lbdsQ5ZpTIPvATh:/zyKxQ4JEdfK2lbxLpTkA
Malware Config
Extracted
formbook
4.1
dn7r
eventphotographerdfw.com
thehalalcoinstaking.com
philipfaziofineart.com
intercoh.com
gaiaseyephotography.com
chatbotforrealestate.com
lovelancemg.com
marlieskasberger.com
elcongoenespanol.info
lepirecredit.com
distribution-concept.com
e99game.com
exit11festival.com
twodollartoothbrushclub.com
cocktailsandlawn.com
performimprove.network
24horas-telefono-11840.com
cosmossify.com
kellenleote.com
perovskite.energy
crosschain.services
xiwanghe.com
mollycayton.com
bonipay.com
uuwyxc.com
viberiokno-online.com
mobceo.com
menzelna.com
tiffaniefoster.com
premiumautowesthartford.com
ownhome.house
bestmartinshop.com
splashstoreofficial.com
guidemining.com
ecshopdemo.com
bestprinting1.com
s-circle2020.com
ncagency.info
easydigitalzone.com
reikiforthecollective.com
theknottteam.com
evolvedpixel.com
japxo.online
ryansqualityrenovations.com
dentimagenquito.net
pantherprints.co.uk
apoporangi.com
thietkemietvuon.net
ifernshop.com
casaruralesgranada.com
camp-3saumons.com
eddsucks.com
blwcd.com
deldlab.com
susanperb.com
autosanitizingsolutions.com
femhouse.com
ironcageclash.com
thekinghealer.com
shaghayeghbovand.com
advertfaces.com
lonriley.com
mased-world.online
mythicspacex.com
yourherogarden.net
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral3/memory/2368-4-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/2368-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/2368-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/1124-20-0x0000000000070000-0x000000000009F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2492 set thread context of 2368 2492 rundll32.exe 31 PID 2368 set thread context of 1212 2368 rundll32.exe 21 PID 2368 set thread context of 1212 2368 rundll32.exe 21 PID 1124 set thread context of 1212 1124 wscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2368 rundll32.exe 2368 rundll32.exe 2368 rundll32.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe 1124 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2368 rundll32.exe 2368 rundll32.exe 2368 rundll32.exe 2368 rundll32.exe 1124 wscript.exe 1124 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2368 rundll32.exe Token: SeDebugPrivilege 1124 wscript.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2492 1976 rundll32.exe 30 PID 1976 wrote to memory of 2492 1976 rundll32.exe 30 PID 1976 wrote to memory of 2492 1976 rundll32.exe 30 PID 1976 wrote to memory of 2492 1976 rundll32.exe 30 PID 1976 wrote to memory of 2492 1976 rundll32.exe 30 PID 1976 wrote to memory of 2492 1976 rundll32.exe 30 PID 1976 wrote to memory of 2492 1976 rundll32.exe 30 PID 2492 wrote to memory of 2368 2492 rundll32.exe 31 PID 2492 wrote to memory of 2368 2492 rundll32.exe 31 PID 2492 wrote to memory of 2368 2492 rundll32.exe 31 PID 2492 wrote to memory of 2368 2492 rundll32.exe 31 PID 2492 wrote to memory of 2368 2492 rundll32.exe 31 PID 2492 wrote to memory of 2368 2492 rundll32.exe 31 PID 2492 wrote to memory of 2368 2492 rundll32.exe 31 PID 2492 wrote to memory of 2368 2492 rundll32.exe 31 PID 2492 wrote to memory of 2368 2492 rundll32.exe 31 PID 2492 wrote to memory of 2368 2492 rundll32.exe 31 PID 1212 wrote to memory of 1124 1212 Explorer.EXE 32 PID 1212 wrote to memory of 1124 1212 Explorer.EXE 32 PID 1212 wrote to memory of 1124 1212 Explorer.EXE 32 PID 1212 wrote to memory of 1124 1212 Explorer.EXE 32 PID 1124 wrote to memory of 1920 1124 wscript.exe 34 PID 1124 wrote to memory of 1920 1124 wscript.exe 34 PID 1124 wrote to memory of 1920 1124 wscript.exe 34 PID 1124 wrote to memory of 1920 1124 wscript.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\pibyjvpg.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\pibyjvpg.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\pibyjvpg.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1920
-
-