Analysis
-
max time kernel
146s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26-10-2022 10:08
Static task
static1
Behavioral task
behavioral1
Sample
DHL Notification_pdf.exe
Resource
win7-20220901-en
General
-
Target
DHL Notification_pdf.exe
-
Size
907KB
-
MD5
a63819a14227fbfb09bfe76a6635816e
-
SHA1
67e165bdb5b954464b9b8586ac2f12e304cd5e57
-
SHA256
0d281b8d5f9c6d1b0a44d2df62a0bff19a14097826ab821218563b3e2fca7826
-
SHA512
9d166aab889d63e3f8d191441ce9c9a0cb02207fd96f490670326fd99c15f2e2bdec3f7d66c60329fad3e49fc69ef6051f891417b210a60f566cb186e7327913
-
SSDEEP
12288:MOq/oCJJ4mUs2iNaj/fieXm40ME2AwuiqO6ePGEDxQNUTXECiOEWM5:vVmUs1C6ODEBit6e+ExQU3CW
Malware Config
Extracted
formbook
4.1
g2e8
sawtiger.com
titanblackcat.buzz
caernarfontown.net
aladdin.coffee
we-buy-houses-cash.net
wfzctag.top
bluehouse.computer
hi88pro.online
smtfhcl.com
claimitznow.xyz
wnshots.store
ky3165.com
reviewforus.xyz
sportsandluxurycars.online
swchx.com
babnetwork.xyz
careplatform.online
ventilationbremen.com
templecause.shop
id-serportesepong345464.shop
conversive.pro
gimis.site
uspabmiytr.info
carolinedufour.site
ztraka.com
abcnews-profit.website
simmasssociates.com
farmax.shop
nemowang.com
bitterrootbjj.com
brucewerkz.com
jikekeranow.com
receitadiaria.online
aseopli.online
79319.top
ky8640.com
girls-party.monster
horstigner.online
fevsdic.shop
selacoin.com
schev.net
ky6952.com
lxv.coffee
backup-as-a-service.info
blairdalyassociates.net
ngr-grax-stanbicibtc.com
marymeredithart.com
stylebulder.com
carolinacollegecamps.com
69tvtv.com
krokha.online
samanawavesdubai.com
gamebaidoithuong368.net
playcredits.xyz
poolandspashow.store
batdongsanchaulong.com
jamil.info
okcode.vip
selectyouroffer.info
thedealsparty.com
defisherpanft.com
65601.top
uruk-project-management.com
astrologylab.net
andfactory.shop
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/676-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/676-64-0x000000000041F140-mapping.dmp formbook behavioral1/memory/676-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1356-73-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/1356-77-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 820 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2032 set thread context of 676 2032 DHL Notification_pdf.exe 27 PID 676 set thread context of 1368 676 DHL Notification_pdf.exe 18 PID 1356 set thread context of 1368 1356 wininit.exe 18 -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 676 DHL Notification_pdf.exe 676 DHL Notification_pdf.exe 1356 wininit.exe 1356 wininit.exe 1356 wininit.exe 1356 wininit.exe 1356 wininit.exe 1356 wininit.exe 1356 wininit.exe 1356 wininit.exe 1356 wininit.exe 1356 wininit.exe 1356 wininit.exe 1356 wininit.exe 1356 wininit.exe 1356 wininit.exe 1356 wininit.exe 1356 wininit.exe 1356 wininit.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1368 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 676 DHL Notification_pdf.exe 676 DHL Notification_pdf.exe 676 DHL Notification_pdf.exe 1356 wininit.exe 1356 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 676 DHL Notification_pdf.exe Token: SeDebugPrivilege 1356 wininit.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1368 Explorer.EXE 1368 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1368 Explorer.EXE 1368 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2032 wrote to memory of 676 2032 DHL Notification_pdf.exe 27 PID 2032 wrote to memory of 676 2032 DHL Notification_pdf.exe 27 PID 2032 wrote to memory of 676 2032 DHL Notification_pdf.exe 27 PID 2032 wrote to memory of 676 2032 DHL Notification_pdf.exe 27 PID 2032 wrote to memory of 676 2032 DHL Notification_pdf.exe 27 PID 2032 wrote to memory of 676 2032 DHL Notification_pdf.exe 27 PID 2032 wrote to memory of 676 2032 DHL Notification_pdf.exe 27 PID 1368 wrote to memory of 1356 1368 Explorer.EXE 28 PID 1368 wrote to memory of 1356 1368 Explorer.EXE 28 PID 1368 wrote to memory of 1356 1368 Explorer.EXE 28 PID 1368 wrote to memory of 1356 1368 Explorer.EXE 28 PID 1356 wrote to memory of 820 1356 wininit.exe 29 PID 1356 wrote to memory of 820 1356 wininit.exe 29 PID 1356 wrote to memory of 820 1356 wininit.exe 29 PID 1356 wrote to memory of 820 1356 wininit.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"3⤵
- Deletes itself
PID:820
-
-