Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
17/10/2022, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
DHL Invoice Details_pdf.exe
Resource
win7-20220901-en
General
-
Target
DHL Invoice Details_pdf.exe
-
Size
828KB
-
MD5
384579444926fb62ca870190509ec096
-
SHA1
818529123f2462098799b6c4dc4aeadda6c170ef
-
SHA256
1e9b2dab23e487f9f8442ab474b4ec7b56d5bbeca861d37c936a6bbbe2e84bdb
-
SHA512
ac05a72fc5d0d1254e67c99ccac8673b823aaa98051f69d4b4f84f42eae00ba4acece648fd232e1e80958af3f1dd200358a02c33384d53271d9b1d76ae28a43a
-
SSDEEP
12288:NwjAs0BRyNr08FI6LouQMQaMjoHmS8A/K17TQoLi8ILTcs/:NwjAs0BROk1kmS897koLi8IH
Malware Config
Extracted
formbook
4.1
d10a
tprgamesslot.com
1wautomarketing.shop
jnfc.bar
reelestate.info
coolvenead.buzz
am2pmconstruction.com
casasbh-digital.com
kmzu.info
magabestonline.com
evdirect.net
utaxi.app
gamemakr.tech
klsxofficial.com
qfaw.mom
bwchosting.com
joseli.xyz
carnelianintimates.com
manarnews.site
axacpe.click
pinupmeals.click
libraryetherealprocess.xyz
tinchap-nganhang.biz
insurancestrategy.agency
dirty-cobra.com
charee.shop
buycheap-cialisonline.net
piecepty.xyz
indocan.info
goldenkeywholesale.com
goremtnbuilders.com
viberteacher.net
s3change.com
moony00tsnft.xyz
gnhousing.com
nasigoreng.online
xraytoys.online
52127.top
tariboamandanigltd.com
nmckyiqsi.top
97238.vip
hsgtw.xyz
jeron.top
animusclothes.com
overhound.xyz
colombiabusca.store
hh42.shop
amb978.club
sec-28082672co.info
youla-secure.ltd
mfaoil-solar.net
marketingyourbrand.dev
larosewashington.site
js-design.info
hkkwmhwv.site
imandkrstore.com
94kv.com
cryptocurrency.haus
zabloudil.website
583535.xyz
businesscapitaladvisor.site
ky9466.com
iklepas.com
seamossexpress.store
bydglobal.online
klix.icu
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/580-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/580-64-0x000000000041F060-mapping.dmp formbook behavioral1/memory/580-70-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/584-74-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/584-78-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1520 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1600 set thread context of 580 1600 DHL Invoice Details_pdf.exe 27 PID 580 set thread context of 1208 580 DHL Invoice Details_pdf.exe 9 PID 584 set thread context of 1208 584 control.exe 9 -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 580 DHL Invoice Details_pdf.exe 580 DHL Invoice Details_pdf.exe 584 control.exe 584 control.exe 584 control.exe 584 control.exe 584 control.exe 584 control.exe 584 control.exe 584 control.exe 584 control.exe 584 control.exe 584 control.exe 584 control.exe 584 control.exe 584 control.exe 584 control.exe 584 control.exe 584 control.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1208 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 580 DHL Invoice Details_pdf.exe 580 DHL Invoice Details_pdf.exe 580 DHL Invoice Details_pdf.exe 584 control.exe 584 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 580 DHL Invoice Details_pdf.exe Token: SeDebugPrivilege 584 control.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1600 wrote to memory of 580 1600 DHL Invoice Details_pdf.exe 27 PID 1600 wrote to memory of 580 1600 DHL Invoice Details_pdf.exe 27 PID 1600 wrote to memory of 580 1600 DHL Invoice Details_pdf.exe 27 PID 1600 wrote to memory of 580 1600 DHL Invoice Details_pdf.exe 27 PID 1600 wrote to memory of 580 1600 DHL Invoice Details_pdf.exe 27 PID 1600 wrote to memory of 580 1600 DHL Invoice Details_pdf.exe 27 PID 1600 wrote to memory of 580 1600 DHL Invoice Details_pdf.exe 27 PID 1208 wrote to memory of 584 1208 Explorer.EXE 28 PID 1208 wrote to memory of 584 1208 Explorer.EXE 28 PID 1208 wrote to memory of 584 1208 Explorer.EXE 28 PID 1208 wrote to memory of 584 1208 Explorer.EXE 28 PID 584 wrote to memory of 1520 584 control.exe 29 PID 584 wrote to memory of 1520 584 control.exe 29 PID 584 wrote to memory of 1520 584 control.exe 29 PID 584 wrote to memory of 1520 584 control.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\DHL Invoice Details_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Invoice Details_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\DHL Invoice Details_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Invoice Details_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL Invoice Details_pdf.exe"3⤵
- Deletes itself
PID:1520
-
-