Analysis
-
max time kernel
146s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18-10-2022 11:17
Static task
static1
Behavioral task
behavioral1
Sample
DHL Notification_pdf.exe
Resource
win7-20220812-en
General
-
Target
DHL Notification_pdf.exe
-
Size
1.0MB
-
MD5
0eed93ef557e81e40fa08e03724d3353
-
SHA1
bb5f4a0cc7009b4b87c7be65bffcf02c626b2017
-
SHA256
2fcc629586efc9cb1a3f5773f8b2908743e3c7aa76f0597871b6ea8e0cfab9c3
-
SHA512
152c2a23f61b1af1dec85173068ec5e4ab47e1fb1855610b4c16d60784d27037cf87517333c1a2440e38fcfc39aea4c0c107a13e0b28f66452b15a3c44f14225
-
SSDEEP
24576:kGxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxNuss1djugHo:2jJHSnibHdAJmFdj
Malware Config
Extracted
formbook
4.1
g2e8
sawtiger.com
titanblackcat.buzz
caernarfontown.net
aladdin.coffee
we-buy-houses-cash.net
wfzctag.top
bluehouse.computer
hi88pro.online
smtfhcl.com
claimitznow.xyz
wnshots.store
ky3165.com
reviewforus.xyz
sportsandluxurycars.online
swchx.com
babnetwork.xyz
careplatform.online
ventilationbremen.com
templecause.shop
id-serportesepong345464.shop
conversive.pro
gimis.site
uspabmiytr.info
carolinedufour.site
ztraka.com
abcnews-profit.website
simmasssociates.com
farmax.shop
nemowang.com
bitterrootbjj.com
brucewerkz.com
jikekeranow.com
receitadiaria.online
aseopli.online
79319.top
ky8640.com
girls-party.monster
horstigner.online
fevsdic.shop
selacoin.com
schev.net
ky6952.com
lxv.coffee
backup-as-a-service.info
blairdalyassociates.net
ngr-grax-stanbicibtc.com
marymeredithart.com
stylebulder.com
carolinacollegecamps.com
69tvtv.com
krokha.online
samanawavesdubai.com
gamebaidoithuong368.net
playcredits.xyz
poolandspashow.store
batdongsanchaulong.com
jamil.info
okcode.vip
selectyouroffer.info
thedealsparty.com
defisherpanft.com
65601.top
uruk-project-management.com
astrologylab.net
andfactory.shop
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/1740-64-0x000000000041F140-mapping.dmp formbook behavioral1/memory/1740-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1740-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1908-74-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/1908-78-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 896 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1412 set thread context of 1740 1412 DHL Notification_pdf.exe 29 PID 1740 set thread context of 1268 1740 DHL Notification_pdf.exe 8 PID 1908 set thread context of 1268 1908 msdt.exe 8 -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1412 DHL Notification_pdf.exe 1412 DHL Notification_pdf.exe 1740 DHL Notification_pdf.exe 1740 DHL Notification_pdf.exe 1908 msdt.exe 1908 msdt.exe 1908 msdt.exe 1908 msdt.exe 1908 msdt.exe 1908 msdt.exe 1908 msdt.exe 1908 msdt.exe 1908 msdt.exe 1908 msdt.exe 1908 msdt.exe 1908 msdt.exe 1908 msdt.exe 1908 msdt.exe 1908 msdt.exe 1908 msdt.exe 1908 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1740 DHL Notification_pdf.exe 1740 DHL Notification_pdf.exe 1740 DHL Notification_pdf.exe 1908 msdt.exe 1908 msdt.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1412 DHL Notification_pdf.exe Token: SeDebugPrivilege 1740 DHL Notification_pdf.exe Token: SeDebugPrivilege 1908 msdt.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1412 wrote to memory of 1280 1412 DHL Notification_pdf.exe 27 PID 1412 wrote to memory of 1280 1412 DHL Notification_pdf.exe 27 PID 1412 wrote to memory of 1280 1412 DHL Notification_pdf.exe 27 PID 1412 wrote to memory of 1280 1412 DHL Notification_pdf.exe 27 PID 1412 wrote to memory of 1244 1412 DHL Notification_pdf.exe 28 PID 1412 wrote to memory of 1244 1412 DHL Notification_pdf.exe 28 PID 1412 wrote to memory of 1244 1412 DHL Notification_pdf.exe 28 PID 1412 wrote to memory of 1244 1412 DHL Notification_pdf.exe 28 PID 1412 wrote to memory of 1740 1412 DHL Notification_pdf.exe 29 PID 1412 wrote to memory of 1740 1412 DHL Notification_pdf.exe 29 PID 1412 wrote to memory of 1740 1412 DHL Notification_pdf.exe 29 PID 1412 wrote to memory of 1740 1412 DHL Notification_pdf.exe 29 PID 1412 wrote to memory of 1740 1412 DHL Notification_pdf.exe 29 PID 1412 wrote to memory of 1740 1412 DHL Notification_pdf.exe 29 PID 1412 wrote to memory of 1740 1412 DHL Notification_pdf.exe 29 PID 1268 wrote to memory of 1908 1268 Explorer.EXE 30 PID 1268 wrote to memory of 1908 1268 Explorer.EXE 30 PID 1268 wrote to memory of 1908 1268 Explorer.EXE 30 PID 1268 wrote to memory of 1908 1268 Explorer.EXE 30 PID 1908 wrote to memory of 896 1908 msdt.exe 31 PID 1908 wrote to memory of 896 1908 msdt.exe 31 PID 1908 wrote to memory of 896 1908 msdt.exe 31 PID 1908 wrote to memory of 896 1908 msdt.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"3⤵PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"3⤵PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"3⤵
- Deletes itself
PID:896
-
-