Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
DHL Notification_pdf.exe
Resource
win7-20220812-en
General
-
Target
DHL Notification_pdf.exe
-
Size
572KB
-
MD5
5d0704142349c70304df4a3e2a401d6b
-
SHA1
d8c0caf793b78713ac02dcd09e0e326d6bd45b18
-
SHA256
8206e029f0266ea051b039afc8b9427f70079ee9d9ba4cb7cacd9f944fd2e9c2
-
SHA512
bcd473e62bdbf5162b300575f41c2a9e3e008d3ed8a34dc875fb81618cddb8b55d1656a050b176d9f7a173dcb93ae0bf753aaaa738b82f98bc3978ee2606456d
-
SSDEEP
12288:th7vEV0mHpuSvMvEahAaWP7IneAdvB3RwkdK0t95/KLEyLONLb/:kPTaGknvvB3Rwko0P52EyLO
Malware Config
Extracted
formbook
4.1
g28p
whhmgs.asia
wellmedcaredirect.net
beggarded.com
wtpjiv.site
todo-celulares.com
parkitny.net
43345.top
pro-genie.com
cwdxz.com
cbc-inc.xyz
healthspots.net
rulil.top
pyramidaudit.solutions
k8sb15.live
hempaware.report
usclink.life
stayefs.net
05262.top
shop-izakaya-jin.com
iccworldcupnews.com
lulamail.xyz
dubaistocks.club
royaleyeandearhospital.com
cash-date.biz
hbfcjgj.com
zcx625.fun
compra-venta-autos.online
waltherchen.xyz
asyimpo.xyz
gayxxxporn.info
xn--igvy44d.xn--55qx5d
teaktime.net
aydesign.xyz
hfamq.site
tunayreklam.net
rxof.rest
naturebody.love
elijahelijah.com
lojasiadis.com
amazrsxrszwna.com
realtranzex.com
elelfo3d.fun
fse.community
28369.xyz
minigolfauthority.net
venturebestdeals.click
robeholidayrentals.store
edarva.skin
xikixvtj.work
ecolabspeyua.store
infidelitytoolkit.com
crawfordbayoysterroast.net
adenongel.dentist
appliancegrey.site
ky7769.com
kshd.xyz
ausbonusbets.com
aks.capital
rv8288.xyz
retetelebunicii.com
younginheart.net
ps4controller.net
todotutoriales10.com
boletosdeavionbaratos.com
spartanburgwebdesign.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4328-137-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4328-143-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2152-146-0x0000000000750000-0x000000000077F000-memory.dmp formbook behavioral2/memory/2152-150-0x0000000000750000-0x000000000077F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2640 set thread context of 4328 2640 DHL Notification_pdf.exe 91 PID 4328 set thread context of 2864 4328 DHL Notification_pdf.exe 44 PID 2152 set thread context of 2864 2152 NETSTAT.EXE 44 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2152 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4328 DHL Notification_pdf.exe 4328 DHL Notification_pdf.exe 4328 DHL Notification_pdf.exe 4328 DHL Notification_pdf.exe 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE 2152 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2864 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4328 DHL Notification_pdf.exe 4328 DHL Notification_pdf.exe 4328 DHL Notification_pdf.exe 2152 NETSTAT.EXE 2152 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4328 DHL Notification_pdf.exe Token: SeDebugPrivilege 2152 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2640 wrote to memory of 4328 2640 DHL Notification_pdf.exe 91 PID 2640 wrote to memory of 4328 2640 DHL Notification_pdf.exe 91 PID 2640 wrote to memory of 4328 2640 DHL Notification_pdf.exe 91 PID 2640 wrote to memory of 4328 2640 DHL Notification_pdf.exe 91 PID 2640 wrote to memory of 4328 2640 DHL Notification_pdf.exe 91 PID 2640 wrote to memory of 4328 2640 DHL Notification_pdf.exe 91 PID 2864 wrote to memory of 2152 2864 Explorer.EXE 92 PID 2864 wrote to memory of 2152 2864 Explorer.EXE 92 PID 2864 wrote to memory of 2152 2864 Explorer.EXE 92 PID 2152 wrote to memory of 1884 2152 NETSTAT.EXE 93 PID 2152 wrote to memory of 1884 2152 NETSTAT.EXE 93 PID 2152 wrote to memory of 1884 2152 NETSTAT.EXE 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4328
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"3⤵PID:1884
-
-