Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2022 11:02
Static task
static1
Behavioral task
behavioral1
Sample
DHL Consignment Details_pdf.exe
Resource
win7-20220901-en
General
-
Target
DHL Consignment Details_pdf.exe
-
Size
933KB
-
MD5
aab1518e80d1e2ae3415ffcd2cedee87
-
SHA1
6be8247d09abdb0c5567e2d23f8850c531f60a04
-
SHA256
9e308c465f428be79179482a5f233ac50211cfb39deb493d9a3a5143d13acda7
-
SHA512
2d13b9e13c6e30515eaadc138b44865db3888144332dd96e544fb1e0e80beb8319fc5e7f1c864a3e356e991f2d89095186074c13ba8551dee41dadf5046b48f4
-
SSDEEP
12288:t/cr2iNrq/vvvGn9Uy6mZUeV7llAsG7qgxxRUsAgOL5YKeshB+LByqzNMP1gURVN:2r1w09Uy6FSPdG7qw7U1hB+LBI
Malware Config
Extracted
formbook
4.1
s20g
coconutdap.com
pukka-party.co.uk
apexrp.dev
boostmycredit.info
bipobofficial.com
bjl009.com
kagoshimum.com
crtinha.xyz
longsteephill.co.uk
forfour4.com
adversata.com
lesaek.ru
chafang3.xyz
haungo.net
mynextgen.africa
credit-cards-45560.com
cnc-printing.com
antoniafredrik.se
likemedclinic.ru
gyeakoncert.com
learnssamsung.com
intercoingroup.com
arresting.one
calcestrum.online
kaaafrikamedia.com
lexdetector.com
businessinabox.world
coolsculpting-queries.life
aylawell.com
car-deals-59194.com
atwatercab.com
drvpreneur.com
chinazhileng.net
findguyscolorado.com
landmarkairchitecturalsigns.com
download-rufuus.com
apu532.com
clothesgroup.net
emergenciaparatodos.com
azurepeace.ru
appraiseacar.com
thepartyshopuk.co.uk
businessflorida.top
bewisemind.com
financialtrainingsols.com
mdcomercio.net
royalcashcrown.com
laktaxi.com
groupiify.com
apec-renovations.com
bkes-2023.info
coquitosrestaurant.com
holypay.africa
screenly.co.uk
ichabodathleticsfund.com
cobballplusin.com
momoaccess.co.uk
lagan.rsvp
wisx.net
uyabid.net
emilialakhi.com
izmirbornovanakliyat.com
16gaokk.com
theevent.rsvp
chrisgate.africa
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3808-138-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3808-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1724-146-0x0000000000A20000-0x0000000000A4F000-memory.dmp formbook behavioral2/memory/1724-149-0x0000000000A20000-0x0000000000A4F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
DHL Consignment Details_pdf.exeDHL Consignment Details_pdf.execscript.exedescription pid process target process PID 2420 set thread context of 3808 2420 DHL Consignment Details_pdf.exe DHL Consignment Details_pdf.exe PID 3808 set thread context of 3060 3808 DHL Consignment Details_pdf.exe Explorer.EXE PID 1724 set thread context of 3060 1724 cscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
DHL Consignment Details_pdf.execscript.exepid process 3808 DHL Consignment Details_pdf.exe 3808 DHL Consignment Details_pdf.exe 3808 DHL Consignment Details_pdf.exe 3808 DHL Consignment Details_pdf.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe 1724 cscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3060 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
DHL Consignment Details_pdf.execscript.exepid process 3808 DHL Consignment Details_pdf.exe 3808 DHL Consignment Details_pdf.exe 3808 DHL Consignment Details_pdf.exe 1724 cscript.exe 1724 cscript.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
DHL Consignment Details_pdf.exeExplorer.EXEcscript.exedescription pid process Token: SeDebugPrivilege 3808 DHL Consignment Details_pdf.exe Token: SeShutdownPrivilege 3060 Explorer.EXE Token: SeCreatePagefilePrivilege 3060 Explorer.EXE Token: SeDebugPrivilege 1724 cscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
DHL Consignment Details_pdf.exeExplorer.EXEcscript.exedescription pid process target process PID 2420 wrote to memory of 3808 2420 DHL Consignment Details_pdf.exe DHL Consignment Details_pdf.exe PID 2420 wrote to memory of 3808 2420 DHL Consignment Details_pdf.exe DHL Consignment Details_pdf.exe PID 2420 wrote to memory of 3808 2420 DHL Consignment Details_pdf.exe DHL Consignment Details_pdf.exe PID 2420 wrote to memory of 3808 2420 DHL Consignment Details_pdf.exe DHL Consignment Details_pdf.exe PID 2420 wrote to memory of 3808 2420 DHL Consignment Details_pdf.exe DHL Consignment Details_pdf.exe PID 2420 wrote to memory of 3808 2420 DHL Consignment Details_pdf.exe DHL Consignment Details_pdf.exe PID 3060 wrote to memory of 1724 3060 Explorer.EXE cscript.exe PID 3060 wrote to memory of 1724 3060 Explorer.EXE cscript.exe PID 3060 wrote to memory of 1724 3060 Explorer.EXE cscript.exe PID 1724 wrote to memory of 3664 1724 cscript.exe cmd.exe PID 1724 wrote to memory of 3664 1724 cscript.exe cmd.exe PID 1724 wrote to memory of 3664 1724 cscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\DHL Consignment Details_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Consignment Details_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\DHL Consignment Details_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Consignment Details_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL Consignment Details_pdf.exe"3⤵PID:3664
-
-