Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 07:40
Static task
static1
Behavioral task
behavioral1
Sample
DHL Notification_pdf (2).exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
DHL Notification_pdf (2).exe
Resource
win10v2004-20221111-en
General
-
Target
DHL Notification_pdf (2).exe
-
Size
696KB
-
MD5
5f5922ac6fadabdcdca744e79c6681b1
-
SHA1
9a13c929512460bab2bb95b07018c7e0766fe81b
-
SHA256
0ce125663c13098237173a0f183ed629019cfaa7a79464a34f109f48e83a49e6
-
SHA512
99a9b4623da4f119bdc4e05c64b29c5473e6e0c99a071ee7294b99ed78c032f3af18ce5ec5cb97996dc7e30373d6b4662c1c7e392a5deccaffef2b6db0b87666
-
SSDEEP
12288:/qgh/PsZ1DX/VDJXyx8WjqAwZCzH+I7Y2+LFcATq0jobbvYSVrY6P:/qgh/PAyr3mCzH+I1+LBqWyVrpP
Malware Config
Extracted
formbook
4.1
j17j
playphf.live
solarthinfilmtec.com
gdhaoshan.com
posh-designs.com
369andrewst.com
doverupblications.com
hengshangmei.com
decungo.com
checksinthemaiil.com
4localde.com
wetakeoveryourhousepayments.com
overcharge-center.com
mmmmmboulder.com
almaszarrin.net
enterpriseturkey.com
lanierfurniture.com
lhzb726-gw021.vip
onuiol.com
dmitrytodosyev.com
117uuu.com
amantrading.net
speechcraft.site
precetpsdigital.com
specialeventsemail.net
rainbowagency.net
keswickhorse.site
yingchiyc.com
bookandcrackle.com
deveauwedding.com
ponigyi.online
yanabaservices.com
queersitive.com
physicallyeducated.com
cccamipto.club
intelifaqs.com
kailashbus.com
4thgencontractors.online
doblesworld.net
buddler.online
mimiskloset.com
digiskies.tech
shyzb.net
updateberitaviral.xyz
digitaljalalu.com
sesac.online
estudiomaof.com
kominka-japan.com
stickatpocket.store
olianon.com
sdnuohai.com
abdulrahmanjamal.com
eroptik.online
dienlanhbienhoa24h.com
britishlogs.com
getmoregadgets.com
defiloyalties.com
supremocintrol.com
lianci.ren
kujiajia.buzz
uula.shop
s-roof.com
kedsdance.com
timeremotejob.com
sulamat.com
downvidro.net
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/1040-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1040-64-0x000000000041F0A0-mapping.dmp formbook behavioral1/memory/1040-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/572-73-0x0000000000070000-0x000000000009F000-memory.dmp formbook behavioral1/memory/572-77-0x0000000000070000-0x000000000009F000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1716 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1204 set thread context of 1040 1204 DHL Notification_pdf (2).exe 27 PID 1040 set thread context of 1288 1040 DHL Notification_pdf (2).exe 15 PID 572 set thread context of 1288 572 cscript.exe 15 -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1040 DHL Notification_pdf (2).exe 1040 DHL Notification_pdf (2).exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe 572 cscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1288 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1040 DHL Notification_pdf (2).exe 1040 DHL Notification_pdf (2).exe 1040 DHL Notification_pdf (2).exe 572 cscript.exe 572 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1040 DHL Notification_pdf (2).exe Token: SeDebugPrivilege 572 cscript.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1288 Explorer.EXE 1288 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1288 Explorer.EXE 1288 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1288 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1040 1204 DHL Notification_pdf (2).exe 27 PID 1204 wrote to memory of 1040 1204 DHL Notification_pdf (2).exe 27 PID 1204 wrote to memory of 1040 1204 DHL Notification_pdf (2).exe 27 PID 1204 wrote to memory of 1040 1204 DHL Notification_pdf (2).exe 27 PID 1204 wrote to memory of 1040 1204 DHL Notification_pdf (2).exe 27 PID 1204 wrote to memory of 1040 1204 DHL Notification_pdf (2).exe 27 PID 1204 wrote to memory of 1040 1204 DHL Notification_pdf (2).exe 27 PID 1288 wrote to memory of 572 1288 Explorer.EXE 28 PID 1288 wrote to memory of 572 1288 Explorer.EXE 28 PID 1288 wrote to memory of 572 1288 Explorer.EXE 28 PID 1288 wrote to memory of 572 1288 Explorer.EXE 28 PID 572 wrote to memory of 1716 572 cscript.exe 29 PID 572 wrote to memory of 1716 572 cscript.exe 29 PID 572 wrote to memory of 1716 572 cscript.exe 29 PID 572 wrote to memory of 1716 572 cscript.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf (2).exe"C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf (2).exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf (2).exe"C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf (2).exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf (2).exe"3⤵
- Deletes itself
PID:1716
-
-