Analysis
-
max time kernel
192s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 07:36
Static task
static1
Behavioral task
behavioral1
Sample
DHL Consgnment Notification_pdf.exe
Resource
win7-20221111-en
General
-
Target
DHL Consgnment Notification_pdf.exe
-
Size
814KB
-
MD5
eccc5475dd661be20724e6b8a131f664
-
SHA1
adbd86d7ccdab284d0080f0a08e3d426a8df21b8
-
SHA256
5868cacef685463a6d4ff4d34f487d09e844511fd4d0f22b4c7ab00a92a2818a
-
SHA512
f61dfbb25c44e9bcc5334b95c1c54c2275876ee50610995dfda2fc6090b9b05e5da66831d288b53e313b6c1aec4b0e24d001792425965914eb03f6d6bdfd19c6
-
SSDEEP
12288:vFyMNTl159j9G9+a3DY366UqXbAyBWWapIg95lvTHRyoY:3b1XZGAaT56VrAyepIgvpjRpY
Malware Config
Extracted
formbook
4.1
g28p
whhmgs.asia
wellmedcaredirect.net
beggarded.com
wtpjiv.site
todo-celulares.com
parkitny.net
43345.top
pro-genie.com
cwdxz.com
cbc-inc.xyz
healthspots.net
rulil.top
pyramidaudit.solutions
k8sb15.live
hempaware.report
usclink.life
stayefs.net
05262.top
shop-izakaya-jin.com
iccworldcupnews.com
lulamail.xyz
dubaistocks.club
royaleyeandearhospital.com
cash-date.biz
hbfcjgj.com
zcx625.fun
compra-venta-autos.online
waltherchen.xyz
asyimpo.xyz
gayxxxporn.info
xn--igvy44d.xn--55qx5d
teaktime.net
aydesign.xyz
hfamq.site
tunayreklam.net
rxof.rest
naturebody.love
elijahelijah.com
lojasiadis.com
amazrsxrszwna.com
realtranzex.com
elelfo3d.fun
fse.community
28369.xyz
minigolfauthority.net
venturebestdeals.click
robeholidayrentals.store
edarva.skin
xikixvtj.work
ecolabspeyua.store
infidelitytoolkit.com
crawfordbayoysterroast.net
adenongel.dentist
appliancegrey.site
ky7769.com
kshd.xyz
ausbonusbets.com
aks.capital
rv8288.xyz
retetelebunicii.com
younginheart.net
ps4controller.net
todotutoriales10.com
boletosdeavionbaratos.com
spartanburgwebdesign.com
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1940-138-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1940-143-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3020-147-0x0000000000ED0000-0x0000000000EFF000-memory.dmp formbook behavioral2/memory/3020-150-0x0000000000ED0000-0x0000000000EFF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
DHL Consgnment Notification_pdf.exeDHL Consgnment Notification_pdf.exemsdt.exedescription pid process target process PID 4796 set thread context of 1940 4796 DHL Consgnment Notification_pdf.exe DHL Consgnment Notification_pdf.exe PID 1940 set thread context of 2176 1940 DHL Consgnment Notification_pdf.exe Explorer.EXE PID 3020 set thread context of 2176 3020 msdt.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
DHL Consgnment Notification_pdf.exemsdt.exepid process 1940 DHL Consgnment Notification_pdf.exe 1940 DHL Consgnment Notification_pdf.exe 1940 DHL Consgnment Notification_pdf.exe 1940 DHL Consgnment Notification_pdf.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe 3020 msdt.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2176 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
DHL Consgnment Notification_pdf.exemsdt.exepid process 1940 DHL Consgnment Notification_pdf.exe 1940 DHL Consgnment Notification_pdf.exe 1940 DHL Consgnment Notification_pdf.exe 3020 msdt.exe 3020 msdt.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
DHL Consgnment Notification_pdf.exemsdt.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1940 DHL Consgnment Notification_pdf.exe Token: SeDebugPrivilege 3020 msdt.exe Token: SeShutdownPrivilege 2176 Explorer.EXE Token: SeCreatePagefilePrivilege 2176 Explorer.EXE Token: SeShutdownPrivilege 2176 Explorer.EXE Token: SeCreatePagefilePrivilege 2176 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 2176 Explorer.EXE 2176 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
DHL Consgnment Notification_pdf.exeExplorer.EXEmsdt.exedescription pid process target process PID 4796 wrote to memory of 1940 4796 DHL Consgnment Notification_pdf.exe DHL Consgnment Notification_pdf.exe PID 4796 wrote to memory of 1940 4796 DHL Consgnment Notification_pdf.exe DHL Consgnment Notification_pdf.exe PID 4796 wrote to memory of 1940 4796 DHL Consgnment Notification_pdf.exe DHL Consgnment Notification_pdf.exe PID 4796 wrote to memory of 1940 4796 DHL Consgnment Notification_pdf.exe DHL Consgnment Notification_pdf.exe PID 4796 wrote to memory of 1940 4796 DHL Consgnment Notification_pdf.exe DHL Consgnment Notification_pdf.exe PID 4796 wrote to memory of 1940 4796 DHL Consgnment Notification_pdf.exe DHL Consgnment Notification_pdf.exe PID 2176 wrote to memory of 3020 2176 Explorer.EXE msdt.exe PID 2176 wrote to memory of 3020 2176 Explorer.EXE msdt.exe PID 2176 wrote to memory of 3020 2176 Explorer.EXE msdt.exe PID 3020 wrote to memory of 1608 3020 msdt.exe cmd.exe PID 3020 wrote to memory of 1608 3020 msdt.exe cmd.exe PID 3020 wrote to memory of 1608 3020 msdt.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\DHL Consgnment Notification_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Consgnment Notification_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\DHL Consgnment Notification_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Consgnment Notification_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1360
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1488
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1588
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1696
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:400
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2304
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:4244
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL Consgnment Notification_pdf.exe"3⤵PID:1608
-
-