Analysis

  • max time kernel
    146s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2024 23:05

General

  • Target

    $PLUGINSDIR/dvxpshe.dll

  • Size

    66KB

  • MD5

    45f315f24046abc7cbe07a0f08a500b4

  • SHA1

    5fcbdb3743ac2497181bd800622b98033e0232bd

  • SHA256

    231d2605fc4ba8b8abed10831692542931ad6e7f647225376723cf385695f1bf

  • SHA512

    a2df0a846c508318eb0eee02921c7f345aaaed5fcc25bee179eb092586c145b8348fb232a22a349fe2bcfa9166778c5812062ce89782d7f8fb2de56497f10a31

  • SSDEEP

    768:6PTL7gePJuhk15raztjcwg0Jm8jYMLZdSDoeA/BUi0O281TbUfszDD3VlcwLVj:6bL7geRubzt/gyj1LZqOvRbUfsbrTR

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

a6hj

Decoy

unlocking.solutions

porscheofac.com

alinadaubermont.com

firstcallindia.xyz

sanot.top

lamborghini.my.id

vbncbcbcncnbcnbcnbcncnb.net

firstclassescapes.com

bestblondehairstylist.com

cncdt.biz

finkeng.xyz

unitedbcttles.com

redbaby.store

redbaby.store

5donline.com

theonewayclothing.com

jgcenterpriseholdings.com

hairshackvb.com

thepunchypineapple.com

fm-conseils.fr

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dvxpshe.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dvxpshe.dll,#1
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1692
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\dvxpshe.dll,#1
          4⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2124
    • C:\Windows\SysWOW64\wlanext.exe
      "C:\Windows\SysWOW64\wlanext.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\rundll32.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1204-6-0x0000000007AE0000-0x0000000007C86000-memory.dmp

    Filesize

    1.6MB

  • memory/1204-10-0x0000000007AE0000-0x0000000007C86000-memory.dmp

    Filesize

    1.6MB

  • memory/1692-0-0x0000000010010000-0x0000000010012000-memory.dmp

    Filesize

    8KB

  • memory/2124-1-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2124-2-0x0000000002100000-0x0000000002403000-memory.dmp

    Filesize

    3.0MB

  • memory/2124-5-0x00000000001B0000-0x00000000001C4000-memory.dmp

    Filesize

    80KB

  • memory/2124-4-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2944-8-0x0000000000740000-0x0000000000756000-memory.dmp

    Filesize

    88KB

  • memory/2944-7-0x0000000000740000-0x0000000000756000-memory.dmp

    Filesize

    88KB

  • memory/2944-9-0x0000000000080000-0x00000000000AF000-memory.dmp

    Filesize

    188KB