Analysis
-
max time kernel
146s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 23:05
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA INVOICE.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PROFORMA INVOICE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/dvxpshe.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/dvxpshe.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/dvxpshe.dll
-
Size
66KB
-
MD5
45f315f24046abc7cbe07a0f08a500b4
-
SHA1
5fcbdb3743ac2497181bd800622b98033e0232bd
-
SHA256
231d2605fc4ba8b8abed10831692542931ad6e7f647225376723cf385695f1bf
-
SHA512
a2df0a846c508318eb0eee02921c7f345aaaed5fcc25bee179eb092586c145b8348fb232a22a349fe2bcfa9166778c5812062ce89782d7f8fb2de56497f10a31
-
SSDEEP
768:6PTL7gePJuhk15raztjcwg0Jm8jYMLZdSDoeA/BUi0O281TbUfszDD3VlcwLVj:6bL7geRubzt/gyj1LZqOvRbUfsbrTR
Malware Config
Extracted
formbook
4.1
a6hj
unlocking.solutions
porscheofac.com
alinadaubermont.com
firstcallindia.xyz
sanot.top
lamborghini.my.id
vbncbcbcncnbcnbcnbcncnb.net
firstclassescapes.com
bestblondehairstylist.com
cncdt.biz
finkeng.xyz
unitedbcttles.com
redbaby.store
redbaby.store
5donline.com
theonewayclothing.com
jgcenterpriseholdings.com
hairshackvb.com
thepunchypineapple.com
fm-conseils.fr
facebookismetaverse.com
ghsfi.com
stratum.online
sjogrenssisterhood.com
shardanrityaniketan.com
wellfargobc.com
sunrise.limited
metastudio.asia
alexa-rate.com
googlecomplaints.com
information-netflix.fr
venomboxing.com
torrbcta.xyz
bigappleacadey.com
leve-trade.com
flex.industries
dromersolutions.com
reschedulefedexparcel.com
betheonemore.com
madani.tv
strikeaposeboothco.com
xmsssm.com
agcocoorp.com
hubertdykiel.com
meta-manchesterunited.com
authservice-informasion.com
coolrepairsystem.com
autorepairstanton.com
citrix.holdings
tmarco.info
wifibudddy.sbs
austinrcp.com
profit1trust.us
sfms.us
shop6-amazon.com
googlemvrs.com
applerepairvaranasi.com
teslasmartglasses.com
liveonenightonly.net
homedepotsp.com
punchfirstbook.com
airstrom.online
usreonetwork.com
groupsxxxtoday.com
starbucksnegotiations.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral3/memory/2124-1-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/2124-4-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/2944-9-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1692 set thread context of 2124 1692 rundll32.exe 31 PID 2124 set thread context of 1204 2124 rundll32.exe 21 PID 2944 set thread context of 1204 2944 wlanext.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2124 rundll32.exe 2124 rundll32.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe 2944 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2124 rundll32.exe 2124 rundll32.exe 2124 rundll32.exe 2944 wlanext.exe 2944 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2124 rundll32.exe Token: SeDebugPrivilege 2944 wlanext.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1800 wrote to memory of 1692 1800 rundll32.exe 30 PID 1800 wrote to memory of 1692 1800 rundll32.exe 30 PID 1800 wrote to memory of 1692 1800 rundll32.exe 30 PID 1800 wrote to memory of 1692 1800 rundll32.exe 30 PID 1800 wrote to memory of 1692 1800 rundll32.exe 30 PID 1800 wrote to memory of 1692 1800 rundll32.exe 30 PID 1800 wrote to memory of 1692 1800 rundll32.exe 30 PID 1692 wrote to memory of 2124 1692 rundll32.exe 31 PID 1692 wrote to memory of 2124 1692 rundll32.exe 31 PID 1692 wrote to memory of 2124 1692 rundll32.exe 31 PID 1692 wrote to memory of 2124 1692 rundll32.exe 31 PID 1692 wrote to memory of 2124 1692 rundll32.exe 31 PID 1692 wrote to memory of 2124 1692 rundll32.exe 31 PID 1692 wrote to memory of 2124 1692 rundll32.exe 31 PID 1692 wrote to memory of 2124 1692 rundll32.exe 31 PID 1692 wrote to memory of 2124 1692 rundll32.exe 31 PID 1692 wrote to memory of 2124 1692 rundll32.exe 31 PID 1204 wrote to memory of 2944 1204 Explorer.EXE 32 PID 1204 wrote to memory of 2944 1204 Explorer.EXE 32 PID 1204 wrote to memory of 2944 1204 Explorer.EXE 32 PID 1204 wrote to memory of 2944 1204 Explorer.EXE 32 PID 2944 wrote to memory of 2092 2944 wlanext.exe 33 PID 2944 wrote to memory of 2092 2944 wlanext.exe 33 PID 2944 wrote to memory of 2092 2944 wlanext.exe 33 PID 2944 wrote to memory of 2092 2944 wlanext.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dvxpshe.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dvxpshe.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dvxpshe.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2092
-
-