Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 08:52
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/j6m19kru6wpzksw.dll
Resource
win7-20241010-en
General
-
Target
$PLUGINSDIR/j6m19kru6wpzksw.dll
-
Size
6KB
-
MD5
fb719cbb8e619a0a53503d32410c099a
-
SHA1
2d6a082ec6171fa00509758b25299278d1944657
-
SHA256
1f1a183a52a36d09ce8611504ee629c7c2ef93ad1b09d32fbf2500441b41d0e6
-
SHA512
68f7d338e41ffade872c8175c0dc62dd296dccd32f9d6308bb0a407c60032877bbd5bff4af7dacbcb3fa023f285ce55935defae750ff7e2108f6ff6f5ab22077
-
SSDEEP
96:vGWc7CvrKoslKrKosdGCA+odjIMVWH7A3Fx:vGpNosZosjABd1WH
Malware Config
Extracted
formbook
4.1
ndc
ezy-kitchen.com
steedx.com
angelicacapital.com
mazinglife.com
courtmillbuilders.com
pakoussaapparel.com
thegirlamongthegirlnow.com
melaninandmarscosmetics.com
skylarfeeneyphotography.com
auto-servis.site
casnza.com
good-un.com
wonderfulwanfield.com
cumulustalent.net
cannapecbd.com
westernsocietyspot.club
021jdwx.com
parcelretail.com
lazakanya.com
muslimmediation.com
scrapnforyou.com
mygrangerwater.com
synthpatico.com
localbitcoinesa.com
ruvapy.com
saitezogmile.xyz
beautyshoped.com
clubmusicbus.com
finchhuttontx.com
tianyuanjiandao.com
toumall.net
babamlabirlikte.com
ofertasmundiais.com
ylc1992.com
winsproduct.com
tempatku.com
globalsteelindia.net
mhf-ugou-hinami.com
cntrybounce.com
thefinal7.com
rfidsystemes.com
mediastudio.digital
romanrvs.com
alibaba-venderr.rest
elenanagy.com
structura.store
hushixueyuan.com
boswant.com
tinyshopperu.com
spacecubes.group
phenix-cis.com
gissellasboutique.com
surfbestie.com
lovehoneyco.com
leoparra.com
familycvs.com
latenight-coder.com
e-baybrazil.com
escolaursamaior.com
studentpii.com
livisave.com
szsaxf.com
realworldmemos.com
twicebilingual.com
nolcra.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral4/memory/2692-1-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral4/memory/2692-4-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3240 set thread context of 2692 3240 rundll32.exe 83 PID 2692 set thread context of 3572 2692 rundll32.exe 56 PID 3744 set thread context of 3572 3744 chkdsk.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2692 rundll32.exe 2692 rundll32.exe 2692 rundll32.exe 2692 rundll32.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe 3744 chkdsk.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3240 rundll32.exe 2692 rundll32.exe 2692 rundll32.exe 2692 rundll32.exe 3744 chkdsk.exe 3744 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2692 rundll32.exe Token: SeDebugPrivilege 3744 chkdsk.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2228 wrote to memory of 3240 2228 rundll32.exe 82 PID 2228 wrote to memory of 3240 2228 rundll32.exe 82 PID 2228 wrote to memory of 3240 2228 rundll32.exe 82 PID 3240 wrote to memory of 2692 3240 rundll32.exe 83 PID 3240 wrote to memory of 2692 3240 rundll32.exe 83 PID 3240 wrote to memory of 2692 3240 rundll32.exe 83 PID 3240 wrote to memory of 2692 3240 rundll32.exe 83 PID 3572 wrote to memory of 3744 3572 Explorer.EXE 84 PID 3572 wrote to memory of 3744 3572 Explorer.EXE 84 PID 3572 wrote to memory of 3744 3572 Explorer.EXE 84 PID 3744 wrote to memory of 3740 3744 chkdsk.exe 85 PID 3744 wrote to memory of 3740 3744 chkdsk.exe 85 PID 3744 wrote to memory of 3740 3744 chkdsk.exe 85
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\j6m19kru6wpzksw.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\j6m19kru6wpzksw.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\j6m19kru6wpzksw.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3740
-
-