Analysis

  • max time kernel
    148s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2022, 14:29

General

  • Target

    DHL Notification_pdf.exe

  • Size

    410KB

  • MD5

    175bb3094e662a84719acd057550210e

  • SHA1

    ca032b78c1a1cf860494a14ff82cbe8e168bf009

  • SHA256

    2808519089c69f066640f310016f55547d60fd4b9c2c972100ca9d80be2b9473

  • SHA512

    d75c6bb272a5b9932df98a5e5f97267905be276d97cd4988a82df45cef4e2fc120f579ec172465f733877284e285ccdb66901073d681baef192c2526700d30f7

  • SSDEEP

    6144:hNeZcTKu1gRtv6cWGd+WQkoUrG1f/o2ANAbIpwMz/eAJ/F8Nd2wJ1ilnTR9t:hNqv6cxdIkQ1noRNAG/hJF8L2jlTRb

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g28p

Decoy

whhmgs.asia

wellmedcaredirect.net

beggarded.com

wtpjiv.site

todo-celulares.com

parkitny.net

43345.top

pro-genie.com

cwdxz.com

cbc-inc.xyz

healthspots.net

rulil.top

pyramidaudit.solutions

k8sb15.live

hempaware.report

usclink.life

stayefs.net

05262.top

shop-izakaya-jin.com

iccworldcupnews.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Users\Admin\AppData\Local\Temp\jdgwoo.exe
        "C:\Users\Admin\AppData\Local\Temp\jdgwoo.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1836
        • C:\Users\Admin\AppData\Local\Temp\jdgwoo.exe
          "C:\Users\Admin\AppData\Local\Temp\jdgwoo.exe"
          4⤵
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:936
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1892
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\jdgwoo.exe"
        3⤵
          PID:2044

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\bymnsvltzmy.g

            Filesize

            4KB

            MD5

            1d44904ed110bd90f63480c1e34ad5e7

            SHA1

            6d7eeda6aa2b8e17cd3b09f569592b0f4e40693b

            SHA256

            77d6fa87840fbda367ab5035793ca624952c3fa7a028383f02041cf3b64081a2

            SHA512

            05b6f8a2c31dd08d347198b472786967ac22a83b3e50524a86c1f5a773c892075463f261cfeb070a592a654ee778228f769da378cd0dfc1b68b1a0c5ea661206

          • C:\Users\Admin\AppData\Local\Temp\jdgwoo.exe

            Filesize

            123KB

            MD5

            2b8eba16a1626129317510285cd4c658

            SHA1

            ebc90aa3aa86c7e0e23c03372677620a74cc6cbc

            SHA256

            4847460b81af91b4c2533c12172e2b7c3cdf15e32d7cea2c0866301a8ab20f88

            SHA512

            32daa40f340da15ad1aedc2737ab1e3fa891bb27ca495ba013a93236b230db56a10ce2f6c285ea885a58241802901ec551ad7cfee15b6703e14daf580b82290f

          • C:\Users\Admin\AppData\Local\Temp\jdgwoo.exe

            Filesize

            123KB

            MD5

            2b8eba16a1626129317510285cd4c658

            SHA1

            ebc90aa3aa86c7e0e23c03372677620a74cc6cbc

            SHA256

            4847460b81af91b4c2533c12172e2b7c3cdf15e32d7cea2c0866301a8ab20f88

            SHA512

            32daa40f340da15ad1aedc2737ab1e3fa891bb27ca495ba013a93236b230db56a10ce2f6c285ea885a58241802901ec551ad7cfee15b6703e14daf580b82290f

          • C:\Users\Admin\AppData\Local\Temp\jdgwoo.exe

            Filesize

            123KB

            MD5

            2b8eba16a1626129317510285cd4c658

            SHA1

            ebc90aa3aa86c7e0e23c03372677620a74cc6cbc

            SHA256

            4847460b81af91b4c2533c12172e2b7c3cdf15e32d7cea2c0866301a8ab20f88

            SHA512

            32daa40f340da15ad1aedc2737ab1e3fa891bb27ca495ba013a93236b230db56a10ce2f6c285ea885a58241802901ec551ad7cfee15b6703e14daf580b82290f

          • C:\Users\Admin\AppData\Local\Temp\ndgxw.e

            Filesize

            185KB

            MD5

            6e936ac69323cd060c6865f50d2f430f

            SHA1

            d9b4035aab626fb0934f9c98ed7106040d8284f0

            SHA256

            f4689146a9d66a07b9d68c60346850097c70922640b327f0216333d3186b6a81

            SHA512

            4bdb0c525e8675d07feb59b7cbd96cbe41058c672573eccc50215faa2cf6001e18a85f85d9c224387fcf6eeebad39abd25e0d35188aaecb86edbdb2280253e96

          • \Users\Admin\AppData\Local\Temp\jdgwoo.exe

            Filesize

            123KB

            MD5

            2b8eba16a1626129317510285cd4c658

            SHA1

            ebc90aa3aa86c7e0e23c03372677620a74cc6cbc

            SHA256

            4847460b81af91b4c2533c12172e2b7c3cdf15e32d7cea2c0866301a8ab20f88

            SHA512

            32daa40f340da15ad1aedc2737ab1e3fa891bb27ca495ba013a93236b230db56a10ce2f6c285ea885a58241802901ec551ad7cfee15b6703e14daf580b82290f

          • \Users\Admin\AppData\Local\Temp\jdgwoo.exe

            Filesize

            123KB

            MD5

            2b8eba16a1626129317510285cd4c658

            SHA1

            ebc90aa3aa86c7e0e23c03372677620a74cc6cbc

            SHA256

            4847460b81af91b4c2533c12172e2b7c3cdf15e32d7cea2c0866301a8ab20f88

            SHA512

            32daa40f340da15ad1aedc2737ab1e3fa891bb27ca495ba013a93236b230db56a10ce2f6c285ea885a58241802901ec551ad7cfee15b6703e14daf580b82290f

          • memory/936-64-0x0000000000AA0000-0x0000000000DA3000-memory.dmp

            Filesize

            3.0MB

          • memory/936-66-0x0000000000290000-0x00000000002A4000-memory.dmp

            Filesize

            80KB

          • memory/1324-76-0x0000000006AF0000-0x0000000006C6C000-memory.dmp

            Filesize

            1.5MB

          • memory/1324-65-0x0000000004DB0000-0x0000000004EB5000-memory.dmp

            Filesize

            1.0MB

          • memory/1324-74-0x0000000004DB0000-0x0000000004EB5000-memory.dmp

            Filesize

            1.0MB

          • memory/1324-73-0x0000000006AF0000-0x0000000006C6C000-memory.dmp

            Filesize

            1.5MB

          • memory/1892-71-0x0000000001F10000-0x0000000002213000-memory.dmp

            Filesize

            3.0MB

          • memory/1892-70-0x00000000000E0000-0x000000000010F000-memory.dmp

            Filesize

            188KB

          • memory/1892-69-0x0000000000830000-0x0000000000837000-memory.dmp

            Filesize

            28KB

          • memory/1892-72-0x0000000001E00000-0x0000000001E93000-memory.dmp

            Filesize

            588KB

          • memory/1892-75-0x00000000000E0000-0x000000000010F000-memory.dmp

            Filesize

            188KB

          • memory/1932-54-0x0000000075981000-0x0000000075983000-memory.dmp

            Filesize

            8KB