Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 11:54
Static task
static1
Behavioral task
behavioral1
Sample
DHL Notification_pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DHL Notification_pdf.exe
Resource
win10v2004-20221111-en
General
-
Target
DHL Notification_pdf.exe
-
Size
922KB
-
MD5
2e20cd4c0bacb0215d89790119b4c07d
-
SHA1
2296db4bde732ee09af6e61b6796835eca3f22fd
-
SHA256
c531fabadc6804c5ec1a9d2741e8e3a1366baca83b70acac740b9996489df4bd
-
SHA512
c4ee37f3d87ce9715bf6b17c518d89186d9e13a989762d031e100285df585c2c0e04ca3177ddd25d36733763cb2cd7c41f56ec2d8d9cf467bd1d04caa8abb4cd
-
SSDEEP
12288:3iK6qU+EZX8KtiKtNGrPF7AcIzqwDGWxGGYN1Kj+4EO1p49wDdzoa1cfN:yK+RF5NqOcJwnAGYc+RO1m9wDdEPf
Malware Config
Extracted
formbook
4.1
j17j
playphf.live
solarthinfilmtec.com
gdhaoshan.com
posh-designs.com
369andrewst.com
doverupblications.com
hengshangmei.com
decungo.com
checksinthemaiil.com
4localde.com
wetakeoveryourhousepayments.com
overcharge-center.com
mmmmmboulder.com
almaszarrin.net
enterpriseturkey.com
lanierfurniture.com
lhzb726-gw021.vip
onuiol.com
dmitrytodosyev.com
117uuu.com
amantrading.net
speechcraft.site
precetpsdigital.com
specialeventsemail.net
rainbowagency.net
keswickhorse.site
yingchiyc.com
bookandcrackle.com
deveauwedding.com
ponigyi.online
yanabaservices.com
queersitive.com
physicallyeducated.com
cccamipto.club
intelifaqs.com
kailashbus.com
4thgencontractors.online
doblesworld.net
buddler.online
mimiskloset.com
digiskies.tech
shyzb.net
updateberitaviral.xyz
digitaljalalu.com
sesac.online
estudiomaof.com
kominka-japan.com
stickatpocket.store
olianon.com
sdnuohai.com
abdulrahmanjamal.com
eroptik.online
dienlanhbienhoa24h.com
britishlogs.com
getmoregadgets.com
defiloyalties.com
supremocintrol.com
lianci.ren
kujiajia.buzz
uula.shop
s-roof.com
kedsdance.com
timeremotejob.com
sulamat.com
downvidro.net
Signatures
-
Formbook payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1360-64-0x000000000041F0A0-mapping.dmp formbook behavioral1/memory/1360-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1360-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/944-73-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook behavioral1/memory/944-77-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 524 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
DHL Notification_pdf.exeDHL Notification_pdf.exehelp.exedescription pid process target process PID 1044 set thread context of 1360 1044 DHL Notification_pdf.exe DHL Notification_pdf.exe PID 1360 set thread context of 1224 1360 DHL Notification_pdf.exe Explorer.EXE PID 944 set thread context of 1224 944 help.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
DHL Notification_pdf.exeDHL Notification_pdf.exehelp.exepid process 1044 DHL Notification_pdf.exe 1360 DHL Notification_pdf.exe 1360 DHL Notification_pdf.exe 944 help.exe 944 help.exe 944 help.exe 944 help.exe 944 help.exe 944 help.exe 944 help.exe 944 help.exe 944 help.exe 944 help.exe 944 help.exe 944 help.exe 944 help.exe 944 help.exe 944 help.exe 944 help.exe 944 help.exe 944 help.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
DHL Notification_pdf.exehelp.exepid process 1360 DHL Notification_pdf.exe 1360 DHL Notification_pdf.exe 1360 DHL Notification_pdf.exe 944 help.exe 944 help.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
DHL Notification_pdf.exeDHL Notification_pdf.exehelp.exedescription pid process Token: SeDebugPrivilege 1044 DHL Notification_pdf.exe Token: SeDebugPrivilege 1360 DHL Notification_pdf.exe Token: SeDebugPrivilege 944 help.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
DHL Notification_pdf.exeExplorer.EXEhelp.exedescription pid process target process PID 1044 wrote to memory of 1552 1044 DHL Notification_pdf.exe DHL Notification_pdf.exe PID 1044 wrote to memory of 1552 1044 DHL Notification_pdf.exe DHL Notification_pdf.exe PID 1044 wrote to memory of 1552 1044 DHL Notification_pdf.exe DHL Notification_pdf.exe PID 1044 wrote to memory of 1552 1044 DHL Notification_pdf.exe DHL Notification_pdf.exe PID 1044 wrote to memory of 1360 1044 DHL Notification_pdf.exe DHL Notification_pdf.exe PID 1044 wrote to memory of 1360 1044 DHL Notification_pdf.exe DHL Notification_pdf.exe PID 1044 wrote to memory of 1360 1044 DHL Notification_pdf.exe DHL Notification_pdf.exe PID 1044 wrote to memory of 1360 1044 DHL Notification_pdf.exe DHL Notification_pdf.exe PID 1044 wrote to memory of 1360 1044 DHL Notification_pdf.exe DHL Notification_pdf.exe PID 1044 wrote to memory of 1360 1044 DHL Notification_pdf.exe DHL Notification_pdf.exe PID 1044 wrote to memory of 1360 1044 DHL Notification_pdf.exe DHL Notification_pdf.exe PID 1224 wrote to memory of 944 1224 Explorer.EXE help.exe PID 1224 wrote to memory of 944 1224 Explorer.EXE help.exe PID 1224 wrote to memory of 944 1224 Explorer.EXE help.exe PID 1224 wrote to memory of 944 1224 Explorer.EXE help.exe PID 944 wrote to memory of 524 944 help.exe cmd.exe PID 944 wrote to memory of 524 944 help.exe cmd.exe PID 944 wrote to memory of 524 944 help.exe cmd.exe PID 944 wrote to memory of 524 944 help.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"3⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1360 -
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"3⤵
- Deletes itself
PID:524
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/524-71-0x0000000000000000-mapping.dmp
-
memory/944-70-0x0000000000000000-mapping.dmp
-
memory/944-77-0x00000000000C0000-0x00000000000EF000-memory.dmpFilesize
188KB
-
memory/944-75-0x00000000009D0000-0x0000000000A64000-memory.dmpFilesize
592KB
-
memory/944-74-0x00000000006C0000-0x00000000009C3000-memory.dmpFilesize
3.0MB
-
memory/944-73-0x00000000000C0000-0x00000000000EF000-memory.dmpFilesize
188KB
-
memory/944-72-0x0000000000B40000-0x0000000000B46000-memory.dmpFilesize
24KB
-
memory/1044-59-0x0000000002090000-0x00000000020F0000-memory.dmpFilesize
384KB
-
memory/1044-54-0x00000000008B0000-0x000000000099E000-memory.dmpFilesize
952KB
-
memory/1044-55-0x0000000075501000-0x0000000075503000-memory.dmpFilesize
8KB
-
memory/1044-56-0x0000000000380000-0x0000000000396000-memory.dmpFilesize
88KB
-
memory/1044-57-0x00000000003A0000-0x00000000003AE000-memory.dmpFilesize
56KB
-
memory/1044-58-0x0000000005800000-0x000000000589A000-memory.dmpFilesize
616KB
-
memory/1224-78-0x0000000006270000-0x00000000063A0000-memory.dmpFilesize
1.2MB
-
memory/1224-76-0x0000000006270000-0x00000000063A0000-memory.dmpFilesize
1.2MB
-
memory/1224-69-0x0000000004B50000-0x0000000004C8E000-memory.dmpFilesize
1.2MB
-
memory/1360-67-0x00000000009A0000-0x0000000000CA3000-memory.dmpFilesize
3.0MB
-
memory/1360-60-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1360-64-0x000000000041F0A0-mapping.dmp
-
memory/1360-68-0x00000000001C0000-0x00000000001D5000-memory.dmpFilesize
84KB
-
memory/1360-63-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1360-66-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1360-61-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB