Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2022, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
DHL Shippment Notification_Pdf.exe
Resource
win7-20220812-en
General
-
Target
DHL Shippment Notification_Pdf.exe
-
Size
1.1MB
-
MD5
b619f997ab8438ff21c618fb65ebb8f4
-
SHA1
f9487f12db87f8ff926f8f2bb08086a660c24844
-
SHA256
369d9c19a6f8e9b3fc88bb922fd7253a50b5fc90b1691972bf89748e19a0ff81
-
SHA512
1c2ebb6bbd39175816acd4a6a16aba0cc9e50d3a147cff4c8874a33590030ce38af92943e970a74c4a2afa0cee211570f140b009d7eba5cfb63d6e5adc585e94
-
SSDEEP
24576:7xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxNussypBxiPnw:ZiPn9rs0Fdj
Malware Config
Extracted
formbook
4.1
d10a
tprgamesslot.com
1wautomarketing.shop
jnfc.bar
reelestate.info
coolvenead.buzz
am2pmconstruction.com
casasbh-digital.com
kmzu.info
magabestonline.com
evdirect.net
utaxi.app
gamemakr.tech
klsxofficial.com
qfaw.mom
bwchosting.com
joseli.xyz
carnelianintimates.com
manarnews.site
axacpe.click
pinupmeals.click
libraryetherealprocess.xyz
tinchap-nganhang.biz
insurancestrategy.agency
dirty-cobra.com
charee.shop
buycheap-cialisonline.net
piecepty.xyz
indocan.info
goldenkeywholesale.com
goremtnbuilders.com
viberteacher.net
s3change.com
moony00tsnft.xyz
gnhousing.com
nasigoreng.online
xraytoys.online
52127.top
tariboamandanigltd.com
nmckyiqsi.top
97238.vip
hsgtw.xyz
jeron.top
animusclothes.com
overhound.xyz
colombiabusca.store
hh42.shop
amb978.club
sec-28082672co.info
youla-secure.ltd
mfaoil-solar.net
marketingyourbrand.dev
larosewashington.site
js-design.info
hkkwmhwv.site
imandkrstore.com
94kv.com
cryptocurrency.haus
zabloudil.website
583535.xyz
businesscapitaladvisor.site
ky9466.com
iklepas.com
seamossexpress.store
bydglobal.online
klix.icu
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4148-139-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4148-141-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4160-147-0x0000000000670000-0x000000000069F000-memory.dmp formbook behavioral2/memory/4160-152-0x0000000000670000-0x000000000069F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4940 set thread context of 4148 4940 DHL Shippment Notification_Pdf.exe 92 PID 4148 set thread context of 2948 4148 DHL Shippment Notification_Pdf.exe 35 PID 4160 set thread context of 2948 4160 mstsc.exe 35 -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4148 DHL Shippment Notification_Pdf.exe 4148 DHL Shippment Notification_Pdf.exe 4148 DHL Shippment Notification_Pdf.exe 4148 DHL Shippment Notification_Pdf.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe 4160 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2948 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4148 DHL Shippment Notification_Pdf.exe 4148 DHL Shippment Notification_Pdf.exe 4148 DHL Shippment Notification_Pdf.exe 4160 mstsc.exe 4160 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4148 DHL Shippment Notification_Pdf.exe Token: SeDebugPrivilege 4160 mstsc.exe Token: SeShutdownPrivilege 2948 Explorer.EXE Token: SeCreatePagefilePrivilege 2948 Explorer.EXE Token: SeShutdownPrivilege 2948 Explorer.EXE Token: SeCreatePagefilePrivilege 2948 Explorer.EXE Token: SeShutdownPrivilege 2948 Explorer.EXE Token: SeCreatePagefilePrivilege 2948 Explorer.EXE Token: SeShutdownPrivilege 2948 Explorer.EXE Token: SeCreatePagefilePrivilege 2948 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4940 wrote to memory of 4148 4940 DHL Shippment Notification_Pdf.exe 92 PID 4940 wrote to memory of 4148 4940 DHL Shippment Notification_Pdf.exe 92 PID 4940 wrote to memory of 4148 4940 DHL Shippment Notification_Pdf.exe 92 PID 4940 wrote to memory of 4148 4940 DHL Shippment Notification_Pdf.exe 92 PID 4940 wrote to memory of 4148 4940 DHL Shippment Notification_Pdf.exe 92 PID 4940 wrote to memory of 4148 4940 DHL Shippment Notification_Pdf.exe 92 PID 2948 wrote to memory of 4160 2948 Explorer.EXE 93 PID 2948 wrote to memory of 4160 2948 Explorer.EXE 93 PID 2948 wrote to memory of 4160 2948 Explorer.EXE 93 PID 4160 wrote to memory of 4448 4160 mstsc.exe 94 PID 4160 wrote to memory of 4448 4160 mstsc.exe 94 PID 4160 wrote to memory of 4448 4160 mstsc.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\DHL Shippment Notification_Pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Shippment Notification_Pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\DHL Shippment Notification_Pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Shippment Notification_Pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL Shippment Notification_Pdf.exe"3⤵PID:4448
-
-