Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 13:13
Static task
static1
Behavioral task
behavioral1
Sample
New Order Euro 670_800.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New Order Euro 670_800.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/jk2l8e.dll
Resource
win7-20240903-en
General
-
Target
$PLUGINSDIR/jk2l8e.dll
-
Size
192KB
-
MD5
b8f29f375c72c72726a9e6fe2c248bab
-
SHA1
5e26da3c3611d123e3411e13b6922fd91093198d
-
SHA256
9a9393c13b7acaa49425ea582746c4ce3ac1344dea406729a3929a6c77c56929
-
SHA512
366b276d7810fd1652b6d1e1dc1bb73dd24be4a8cb668f91c1d77d7891cb1eedf0ca2bab5ffae3f51ddc895e1ea52ef06fc03de539deecf21b2a421f6a9e9d73
-
SSDEEP
3072:L1UTRSZGMM9jNWI/+xHxoc1AvbDGmxOJydH1ftnYZm0Hbk/b9Sia+i57AO0Ukxa1:RUUGMMxNWI/yRrAvbAydH1ftnYJbkjsp
Malware Config
Extracted
formbook
4.1
tba
dzmcos.com
northlandautocenterfargo.com
today2check.com
izoozstudios.com
happyhodgkins.com
allzoy.com
805isaac.com
247likeaboss.com
guxsdesign.com
olenfex.com
roadsignsaroundtheworld.com
bleedingedgealpha.com
aladdinperu.com
skip2-kansd.com
todpod.club
theslicee.com
hbhnfs.com
jkrso.com
presgram.com
vedmaths.com
everylittlebithelpstheworld.com
snapdragonessentials.com
mediasunnahlombok.com
archimedeslearning.com
wwwwtw111.com
thestitchonline.com
ksieo.me
subspace20.com
campus-africa.com
goldreignbeauty.com
buyersgoogle.com
9566.xyz
sandy-andrew.com
k-wifi.com
shygirlfashion.com
thekitchengeezer.com
laylowbossup.com
takticsolution.com
itspineappleshop.com
flazzbit.com
fullonoffer.com
xn--p8j7a1jn66o0wpxs0e.club
johnloh.net
holdukawu.com
hillsideholdingsllc.com
fauw111.icu
suzukidealerjakarta.com
topsych.com
peakorgmush.net
comprehensivefilmbuying.com
embiente.com
matenglishcenter.com
ramatganchoir.com
milannelcuore.com
livesatx.com
defigravity.exchange
spectrumgrouppoland.com
thegummywheel.com
royablvd.com
susanssource.com
ecypacbvba.com
gladhabits.com
desigparis.com
surup-v44.club
vtnywveby.club
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral5/memory/1924-1-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral5/memory/1924-5-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2364 set thread context of 1924 2364 rundll32.exe 31 PID 1924 set thread context of 1204 1924 rundll32.exe 21 PID 320 set thread context of 1204 320 help.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 2364 rundll32.exe 1924 rundll32.exe 1924 rundll32.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe 320 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2364 rundll32.exe 1924 rundll32.exe 1924 rundll32.exe 1924 rundll32.exe 320 help.exe 320 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1924 rundll32.exe Token: SeDebugPrivilege 320 help.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2364 2404 rundll32.exe 30 PID 2404 wrote to memory of 2364 2404 rundll32.exe 30 PID 2404 wrote to memory of 2364 2404 rundll32.exe 30 PID 2404 wrote to memory of 2364 2404 rundll32.exe 30 PID 2404 wrote to memory of 2364 2404 rundll32.exe 30 PID 2404 wrote to memory of 2364 2404 rundll32.exe 30 PID 2404 wrote to memory of 2364 2404 rundll32.exe 30 PID 2364 wrote to memory of 1924 2364 rundll32.exe 31 PID 2364 wrote to memory of 1924 2364 rundll32.exe 31 PID 2364 wrote to memory of 1924 2364 rundll32.exe 31 PID 2364 wrote to memory of 1924 2364 rundll32.exe 31 PID 2364 wrote to memory of 1924 2364 rundll32.exe 31 PID 2364 wrote to memory of 1924 2364 rundll32.exe 31 PID 2364 wrote to memory of 1924 2364 rundll32.exe 31 PID 2364 wrote to memory of 1924 2364 rundll32.exe 31 PID 1204 wrote to memory of 320 1204 Explorer.EXE 32 PID 1204 wrote to memory of 320 1204 Explorer.EXE 32 PID 1204 wrote to memory of 320 1204 Explorer.EXE 32 PID 1204 wrote to memory of 320 1204 Explorer.EXE 32 PID 320 wrote to memory of 2888 320 help.exe 34 PID 320 wrote to memory of 2888 320 help.exe 34 PID 320 wrote to memory of 2888 320 help.exe 34 PID 320 wrote to memory of 2888 320 help.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jk2l8e.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jk2l8e.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jk2l8e.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-