Analysis
-
max time kernel
148s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-09-2022 07:39
Static task
static1
Behavioral task
behavioral1
Sample
DHL Notification_pdf.exe
Resource
win7-20220812-en
General
-
Target
DHL Notification_pdf.exe
-
Size
955KB
-
MD5
e4d3a2a96f83710d4f05c95db5bf32ce
-
SHA1
560a72bee671905998930ec51ba02a03644242d0
-
SHA256
2e22d1469e5bc652bc2a5d4180e4ade7f280515b12546416dd9cea6ea4b2ca3b
-
SHA512
ee94abac814d0dc4f5e7d2d14f1bb31e4ae3fccd8624b2240a10b6c5d6568733a9582f25d9b0e5a846992e1172485a0794b562d1f409d31b54faaf34555f666e
-
SSDEEP
24576:nv2fBGmdLD9uZW8T90mDrM0E+91Sccdj5Mw:v2pGmhZuZr90mDF9Uuw
Malware Config
Extracted
formbook
4.1
ko29
citusdig.site
ecomrise.store
aringtonortho.com
plan-indonesia.com
retreat-to-the-alps.com
themerchperch.biz
freshfashiondesign.com
zachmizrachi.com
machomancoin.site
racunhariini.com
13378888.com
landofnd.com
techactive.digital
yourdebttips.com
www147171.com
xraino.top
willshouseofhorrors.com
redfiree.com
cyanband.com
srbs35.com
principaldirects.site
lamarnationa.com
guidedshop.co.uk
masajedomiciliomarbella.com
polska-sterydy.com
jakepaulcrypto.com
kumarrahulclub.xyz
ps01.xyz
americanboard-us.com
shopkashandlaine.com
seedzfoundation.com
se-updates.nz
savanoparksjdm.com
truckmodeler.com
harriwhistle.store
hostmani.com
redepaz.com
yourfinewine.com
naveendj.com
theo-creative.com
radio-podcast.info
juniatainsurance.net
esquiviaseguros.co
amazonmx.top
thefishinclub.com
plugintowealth.com
blackdatasociety.com
kimsretro.com
hornemakers.com
nobullauonlineshop.com
smartcorpmail.com
vibotrade.com
foomusic.com
limitedessense.net
testingcommerce.com
lalvaniandco.com
ba2bd.com
dmsander.site
booksea.net
strong-seo.co.uk
clearlookbymarteli.com
dainclog.xyz
bentleysrenovationsllc.net
sexporno-girls.com
535cambridge.com
Signatures
-
Formbook payload 6 IoCs
resource yara_rule behavioral1/memory/1280-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1280-64-0x000000000041F0E0-mapping.dmp formbook behavioral1/memory/1280-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1280-74-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1780-77-0x00000000000E0000-0x000000000010F000-memory.dmp formbook behavioral1/memory/1780-81-0x00000000000E0000-0x000000000010F000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1716 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1348 set thread context of 1280 1348 DHL Notification_pdf.exe 26 PID 1280 set thread context of 1188 1280 DHL Notification_pdf.exe 12 PID 1280 set thread context of 1188 1280 DHL Notification_pdf.exe 12 PID 1780 set thread context of 1188 1780 NAPSTAT.EXE 12 -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1280 DHL Notification_pdf.exe 1280 DHL Notification_pdf.exe 1280 DHL Notification_pdf.exe 1780 NAPSTAT.EXE 1780 NAPSTAT.EXE 1780 NAPSTAT.EXE 1780 NAPSTAT.EXE 1780 NAPSTAT.EXE 1780 NAPSTAT.EXE 1780 NAPSTAT.EXE 1780 NAPSTAT.EXE 1780 NAPSTAT.EXE 1780 NAPSTAT.EXE 1780 NAPSTAT.EXE 1780 NAPSTAT.EXE 1780 NAPSTAT.EXE 1780 NAPSTAT.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1280 DHL Notification_pdf.exe 1280 DHL Notification_pdf.exe 1280 DHL Notification_pdf.exe 1280 DHL Notification_pdf.exe 1780 NAPSTAT.EXE 1780 NAPSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1280 DHL Notification_pdf.exe Token: SeDebugPrivilege 1780 NAPSTAT.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1188 Explorer.EXE 1188 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1188 Explorer.EXE 1188 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1280 1348 DHL Notification_pdf.exe 26 PID 1348 wrote to memory of 1280 1348 DHL Notification_pdf.exe 26 PID 1348 wrote to memory of 1280 1348 DHL Notification_pdf.exe 26 PID 1348 wrote to memory of 1280 1348 DHL Notification_pdf.exe 26 PID 1348 wrote to memory of 1280 1348 DHL Notification_pdf.exe 26 PID 1348 wrote to memory of 1280 1348 DHL Notification_pdf.exe 26 PID 1348 wrote to memory of 1280 1348 DHL Notification_pdf.exe 26 PID 1280 wrote to memory of 1780 1280 DHL Notification_pdf.exe 27 PID 1280 wrote to memory of 1780 1280 DHL Notification_pdf.exe 27 PID 1280 wrote to memory of 1780 1280 DHL Notification_pdf.exe 27 PID 1280 wrote to memory of 1780 1280 DHL Notification_pdf.exe 27 PID 1780 wrote to memory of 1716 1780 NAPSTAT.EXE 28 PID 1780 wrote to memory of 1716 1780 NAPSTAT.EXE 28 PID 1780 wrote to memory of 1716 1780 NAPSTAT.EXE 28 PID 1780 wrote to memory of 1716 1780 NAPSTAT.EXE 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"5⤵
- Deletes itself
PID:1716
-
-
-
-