Analysis

  • max time kernel
    146s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2022 11:17

General

  • Target

    DHL Notification_pdf.exe

  • Size

    1.0MB

  • MD5

    0eed93ef557e81e40fa08e03724d3353

  • SHA1

    bb5f4a0cc7009b4b87c7be65bffcf02c626b2017

  • SHA256

    2fcc629586efc9cb1a3f5773f8b2908743e3c7aa76f0597871b6ea8e0cfab9c3

  • SHA512

    152c2a23f61b1af1dec85173068ec5e4ab47e1fb1855610b4c16d60784d27037cf87517333c1a2440e38fcfc39aea4c0c107a13e0b28f66452b15a3c44f14225

  • SSDEEP

    24576:kGxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxNuss1djugHo:2jJHSnibHdAJmFdj

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g2e8

Decoy

sawtiger.com

titanblackcat.buzz

caernarfontown.net

aladdin.coffee

we-buy-houses-cash.net

wfzctag.top

bluehouse.computer

hi88pro.online

smtfhcl.com

claimitznow.xyz

wnshots.store

ky3165.com

reviewforus.xyz

sportsandluxurycars.online

swchx.com

babnetwork.xyz

careplatform.online

ventilationbremen.com

templecause.shop

id-serportesepong345464.shop

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"
        3⤵
          PID:1280
        • C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe
          "C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"
          3⤵
            PID:1244
          • C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe
            "C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:1740
        • C:\Windows\SysWOW64\msdt.exe
          "C:\Windows\SysWOW64\msdt.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1908
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"
            3⤵
            • Deletes itself
            PID:896

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/896-72-0x0000000000000000-mapping.dmp

      • memory/1268-69-0x00000000065B0000-0x0000000006680000-memory.dmp

        Filesize

        832KB

      • memory/1268-79-0x0000000006880000-0x0000000006922000-memory.dmp

        Filesize

        648KB

      • memory/1268-77-0x0000000006880000-0x0000000006922000-memory.dmp

        Filesize

        648KB

      • memory/1412-59-0x0000000004C60000-0x0000000004C94000-memory.dmp

        Filesize

        208KB

      • memory/1412-58-0x0000000000660000-0x00000000006EE000-memory.dmp

        Filesize

        568KB

      • memory/1412-55-0x0000000075771000-0x0000000075773000-memory.dmp

        Filesize

        8KB

      • memory/1412-56-0x00000000007A0000-0x00000000007B8000-memory.dmp

        Filesize

        96KB

      • memory/1412-57-0x00000000004C0000-0x00000000004CC000-memory.dmp

        Filesize

        48KB

      • memory/1412-54-0x00000000001E0000-0x00000000002EC000-memory.dmp

        Filesize

        1.0MB

      • memory/1740-66-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1740-68-0x0000000000390000-0x00000000003A4000-memory.dmp

        Filesize

        80KB

      • memory/1740-67-0x0000000000AE0000-0x0000000000DE3000-memory.dmp

        Filesize

        3.0MB

      • memory/1740-63-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1740-64-0x000000000041F140-mapping.dmp

      • memory/1740-60-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1740-61-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/1908-70-0x0000000000000000-mapping.dmp

      • memory/1908-73-0x0000000000CB0000-0x0000000000DA4000-memory.dmp

        Filesize

        976KB

      • memory/1908-74-0x0000000000080000-0x00000000000AF000-memory.dmp

        Filesize

        188KB

      • memory/1908-75-0x0000000002340000-0x0000000002643000-memory.dmp

        Filesize

        3.0MB

      • memory/1908-76-0x0000000000BA0000-0x0000000000C33000-memory.dmp

        Filesize

        588KB

      • memory/1908-78-0x0000000000080000-0x00000000000AF000-memory.dmp

        Filesize

        188KB