Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2022, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
DHL Invoice Details_pdf.exe
Resource
win7-20220901-en
General
-
Target
DHL Invoice Details_pdf.exe
-
Size
828KB
-
MD5
384579444926fb62ca870190509ec096
-
SHA1
818529123f2462098799b6c4dc4aeadda6c170ef
-
SHA256
1e9b2dab23e487f9f8442ab474b4ec7b56d5bbeca861d37c936a6bbbe2e84bdb
-
SHA512
ac05a72fc5d0d1254e67c99ccac8673b823aaa98051f69d4b4f84f42eae00ba4acece648fd232e1e80958af3f1dd200358a02c33384d53271d9b1d76ae28a43a
-
SSDEEP
12288:NwjAs0BRyNr08FI6LouQMQaMjoHmS8A/K17TQoLi8ILTcs/:NwjAs0BROk1kmS897koLi8IH
Malware Config
Extracted
formbook
4.1
d10a
tprgamesslot.com
1wautomarketing.shop
jnfc.bar
reelestate.info
coolvenead.buzz
am2pmconstruction.com
casasbh-digital.com
kmzu.info
magabestonline.com
evdirect.net
utaxi.app
gamemakr.tech
klsxofficial.com
qfaw.mom
bwchosting.com
joseli.xyz
carnelianintimates.com
manarnews.site
axacpe.click
pinupmeals.click
libraryetherealprocess.xyz
tinchap-nganhang.biz
insurancestrategy.agency
dirty-cobra.com
charee.shop
buycheap-cialisonline.net
piecepty.xyz
indocan.info
goldenkeywholesale.com
goremtnbuilders.com
viberteacher.net
s3change.com
moony00tsnft.xyz
gnhousing.com
nasigoreng.online
xraytoys.online
52127.top
tariboamandanigltd.com
nmckyiqsi.top
97238.vip
hsgtw.xyz
jeron.top
animusclothes.com
overhound.xyz
colombiabusca.store
hh42.shop
amb978.club
sec-28082672co.info
youla-secure.ltd
mfaoil-solar.net
marketingyourbrand.dev
larosewashington.site
js-design.info
hkkwmhwv.site
imandkrstore.com
94kv.com
cryptocurrency.haus
zabloudil.website
583535.xyz
businesscapitaladvisor.site
ky9466.com
iklepas.com
seamossexpress.store
bydglobal.online
klix.icu
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/3580-139-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3580-141-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4908-147-0x0000000000C30000-0x0000000000C5F000-memory.dmp formbook behavioral2/memory/4908-152-0x0000000000C30000-0x0000000000C5F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3216 set thread context of 3580 3216 DHL Invoice Details_pdf.exe 91 PID 3580 set thread context of 2560 3580 DHL Invoice Details_pdf.exe 11 PID 4908 set thread context of 2560 4908 msiexec.exe 11 -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3580 DHL Invoice Details_pdf.exe 3580 DHL Invoice Details_pdf.exe 3580 DHL Invoice Details_pdf.exe 3580 DHL Invoice Details_pdf.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe 4908 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2560 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3580 DHL Invoice Details_pdf.exe 3580 DHL Invoice Details_pdf.exe 3580 DHL Invoice Details_pdf.exe 4908 msiexec.exe 4908 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3580 DHL Invoice Details_pdf.exe Token: SeDebugPrivilege 4908 msiexec.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3216 wrote to memory of 3580 3216 DHL Invoice Details_pdf.exe 91 PID 3216 wrote to memory of 3580 3216 DHL Invoice Details_pdf.exe 91 PID 3216 wrote to memory of 3580 3216 DHL Invoice Details_pdf.exe 91 PID 3216 wrote to memory of 3580 3216 DHL Invoice Details_pdf.exe 91 PID 3216 wrote to memory of 3580 3216 DHL Invoice Details_pdf.exe 91 PID 3216 wrote to memory of 3580 3216 DHL Invoice Details_pdf.exe 91 PID 2560 wrote to memory of 4908 2560 Explorer.EXE 92 PID 2560 wrote to memory of 4908 2560 Explorer.EXE 92 PID 2560 wrote to memory of 4908 2560 Explorer.EXE 92 PID 4908 wrote to memory of 1496 4908 msiexec.exe 93 PID 4908 wrote to memory of 1496 4908 msiexec.exe 93 PID 4908 wrote to memory of 1496 4908 msiexec.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\DHL Invoice Details_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Invoice Details_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\DHL Invoice Details_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Invoice Details_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3580
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL Invoice Details_pdf.exe"3⤵PID:1496
-
-