Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 08:52
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/j6m19kru6wpzksw.dll
Resource
win7-20241010-en
General
-
Target
$PLUGINSDIR/j6m19kru6wpzksw.dll
-
Size
6KB
-
MD5
fb719cbb8e619a0a53503d32410c099a
-
SHA1
2d6a082ec6171fa00509758b25299278d1944657
-
SHA256
1f1a183a52a36d09ce8611504ee629c7c2ef93ad1b09d32fbf2500441b41d0e6
-
SHA512
68f7d338e41ffade872c8175c0dc62dd296dccd32f9d6308bb0a407c60032877bbd5bff4af7dacbcb3fa023f285ce55935defae750ff7e2108f6ff6f5ab22077
-
SSDEEP
96:vGWc7CvrKoslKrKosdGCA+odjIMVWH7A3Fx:vGpNosZosjABd1WH
Malware Config
Extracted
formbook
4.1
ndc
ezy-kitchen.com
steedx.com
angelicacapital.com
mazinglife.com
courtmillbuilders.com
pakoussaapparel.com
thegirlamongthegirlnow.com
melaninandmarscosmetics.com
skylarfeeneyphotography.com
auto-servis.site
casnza.com
good-un.com
wonderfulwanfield.com
cumulustalent.net
cannapecbd.com
westernsocietyspot.club
021jdwx.com
parcelretail.com
lazakanya.com
muslimmediation.com
scrapnforyou.com
mygrangerwater.com
synthpatico.com
localbitcoinesa.com
ruvapy.com
saitezogmile.xyz
beautyshoped.com
clubmusicbus.com
finchhuttontx.com
tianyuanjiandao.com
toumall.net
babamlabirlikte.com
ofertasmundiais.com
ylc1992.com
winsproduct.com
tempatku.com
globalsteelindia.net
mhf-ugou-hinami.com
cntrybounce.com
thefinal7.com
rfidsystemes.com
mediastudio.digital
romanrvs.com
alibaba-venderr.rest
elenanagy.com
structura.store
hushixueyuan.com
boswant.com
tinyshopperu.com
spacecubes.group
phenix-cis.com
gissellasboutique.com
surfbestie.com
lovehoneyco.com
leoparra.com
familycvs.com
latenight-coder.com
e-baybrazil.com
escolaursamaior.com
studentpii.com
livisave.com
szsaxf.com
realworldmemos.com
twicebilingual.com
nolcra.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral3/memory/2980-1-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral3/memory/2980-4-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3056 set thread context of 2980 3056 rundll32.exe 31 PID 2980 set thread context of 1200 2980 rundll32.exe 21 -
Program crash 1 IoCs
pid pid_target Process procid_target 2996 2740 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2980 rundll32.exe 2980 rundll32.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 3056 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2980 rundll32.exe Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3040 wrote to memory of 3056 3040 rundll32.exe 30 PID 3040 wrote to memory of 3056 3040 rundll32.exe 30 PID 3040 wrote to memory of 3056 3040 rundll32.exe 30 PID 3040 wrote to memory of 3056 3040 rundll32.exe 30 PID 3040 wrote to memory of 3056 3040 rundll32.exe 30 PID 3040 wrote to memory of 3056 3040 rundll32.exe 30 PID 3040 wrote to memory of 3056 3040 rundll32.exe 30 PID 3056 wrote to memory of 2980 3056 rundll32.exe 31 PID 3056 wrote to memory of 2980 3056 rundll32.exe 31 PID 3056 wrote to memory of 2980 3056 rundll32.exe 31 PID 3056 wrote to memory of 2980 3056 rundll32.exe 31 PID 3056 wrote to memory of 2980 3056 rundll32.exe 31 PID 3056 wrote to memory of 2980 3056 rundll32.exe 31 PID 3056 wrote to memory of 2980 3056 rundll32.exe 31 PID 3056 wrote to memory of 2980 3056 rundll32.exe 31 PID 1200 wrote to memory of 2740 1200 Explorer.EXE 35 PID 1200 wrote to memory of 2740 1200 Explorer.EXE 35 PID 1200 wrote to memory of 2740 1200 Explorer.EXE 35 PID 1200 wrote to memory of 2740 1200 Explorer.EXE 35 PID 1200 wrote to memory of 2740 1200 Explorer.EXE 35 PID 1200 wrote to memory of 2740 1200 Explorer.EXE 35 PID 1200 wrote to memory of 2740 1200 Explorer.EXE 35 PID 2740 wrote to memory of 2996 2740 msiexec.exe 36 PID 2740 wrote to memory of 2996 2740 msiexec.exe 36 PID 2740 wrote to memory of 2996 2740 msiexec.exe 36 PID 2740 wrote to memory of 2996 2740 msiexec.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\j6m19kru6wpzksw.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\j6m19kru6wpzksw.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\j6m19kru6wpzksw.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2016
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2388
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2500
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 2723⤵
- Program crash
PID:2996
-
-