Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-05-2023 05:06
Static task
static1
Behavioral task
behavioral1
Sample
SHIPPING DOCUMENTS. 25.23.exe
Resource
win7-20230220-en
General
-
Target
SHIPPING DOCUMENTS. 25.23.exe
-
Size
670KB
-
MD5
77783c6f99127280ab5c677c1c96bf7c
-
SHA1
5327e4ca332aa28267444a12cd692375291a4ce2
-
SHA256
e8f271e2c00c7310ba76f5be24f425df7b4c3fdd84a0b715906a10da4f7e879b
-
SHA512
e134cecc97558e46ee9b26cc1c6a818fd3697360d62a171aa2912900cfbf569a8aedc2de6e466d42f9401f964319af36203c389af46332d40bce2390bed1ef91
-
SSDEEP
12288:S8RXgHLZIcZI13TZFseMdvkp/TpVMYEVxhe+XbeG7aEGONgLQ:SsAtDmJZTu8ptipSupf
Malware Config
Extracted
formbook
4.1
ga36
700kitchen.com
udda.app
fractionalgc.tech
tipmercados.net
2-upapparel.net
directbookdiscount.com
koewetzeltours.com
d7c8-iuxt.com
hamaancook.com
benjaimnmoore.com
yimaglobal.africa
dispovapo.com
aseguvenlik.com
battery-worth.com
dddanbao.mobi
blueskyauberge.com
740.mobi
betterbonella.com
liverally.club
czubao.com
elliotthead.com
borkr.one
drvnsat.net
coldwellbankersolar.com
cityofexpertise.co.uk
independentdentist.network
bladesofbeautybymichelle.com
gqf5y.com
astergab.com
eventinvite.rsvp
indyfurnitureguild.com
theunrelentingbrush.co.uk
concealedcarry.info
a-alphaxtraboost.com
21diasdegratitud.com
edlevostatus.se
hradvocaciacriminal.com
efefindustrious.buzz
arafat.xyz
jlhaoniu.com
citizensbank.top
eatzpizzeria.com
everestfunerak.com
thecovenscorner.co.uk
subskrebcstumer.com
calabatherapy.com
braces-cost-affordable.com
erinandjacob.com
hakkaqq.website
flymavis.com
9774.top
hcthi.com
ecommercecolcorp.com
blackbluejetfriday.com
fralu.tech
biohackinghealthspan.com
cumhuriyet.click
dynamicbingo.live
jonashaapp.store
intentionallivingsoul.com
careerguru.academy
mexob.online
calaaccessories.com
kolagaems.com
310003.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/320-64-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/320-67-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1612-72-0x0000000000070000-0x000000000009F000-memory.dmp formbook behavioral1/memory/1612-74-0x0000000000070000-0x000000000009F000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 976 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1972 set thread context of 320 1972 SHIPPING DOCUMENTS. 25.23.exe 29 PID 320 set thread context of 1184 320 SHIPPING DOCUMENTS. 25.23.exe 13 PID 1612 set thread context of 1184 1612 wscript.exe 13 -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1972 SHIPPING DOCUMENTS. 25.23.exe 320 SHIPPING DOCUMENTS. 25.23.exe 320 SHIPPING DOCUMENTS. 25.23.exe 1612 wscript.exe 1612 wscript.exe 1612 wscript.exe 1612 wscript.exe 1612 wscript.exe 1612 wscript.exe 1612 wscript.exe 1612 wscript.exe 1612 wscript.exe 1612 wscript.exe 1612 wscript.exe 1612 wscript.exe 1612 wscript.exe 1612 wscript.exe 1612 wscript.exe 1612 wscript.exe 1612 wscript.exe 1612 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1184 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 320 SHIPPING DOCUMENTS. 25.23.exe 320 SHIPPING DOCUMENTS. 25.23.exe 320 SHIPPING DOCUMENTS. 25.23.exe 1612 wscript.exe 1612 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1972 SHIPPING DOCUMENTS. 25.23.exe Token: SeDebugPrivilege 320 SHIPPING DOCUMENTS. 25.23.exe Token: SeDebugPrivilege 1612 wscript.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1184 Explorer.EXE 1184 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1184 Explorer.EXE 1184 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1324 1972 SHIPPING DOCUMENTS. 25.23.exe 28 PID 1972 wrote to memory of 1324 1972 SHIPPING DOCUMENTS. 25.23.exe 28 PID 1972 wrote to memory of 1324 1972 SHIPPING DOCUMENTS. 25.23.exe 28 PID 1972 wrote to memory of 1324 1972 SHIPPING DOCUMENTS. 25.23.exe 28 PID 1972 wrote to memory of 320 1972 SHIPPING DOCUMENTS. 25.23.exe 29 PID 1972 wrote to memory of 320 1972 SHIPPING DOCUMENTS. 25.23.exe 29 PID 1972 wrote to memory of 320 1972 SHIPPING DOCUMENTS. 25.23.exe 29 PID 1972 wrote to memory of 320 1972 SHIPPING DOCUMENTS. 25.23.exe 29 PID 1972 wrote to memory of 320 1972 SHIPPING DOCUMENTS. 25.23.exe 29 PID 1972 wrote to memory of 320 1972 SHIPPING DOCUMENTS. 25.23.exe 29 PID 1972 wrote to memory of 320 1972 SHIPPING DOCUMENTS. 25.23.exe 29 PID 1184 wrote to memory of 1612 1184 Explorer.EXE 30 PID 1184 wrote to memory of 1612 1184 Explorer.EXE 30 PID 1184 wrote to memory of 1612 1184 Explorer.EXE 30 PID 1184 wrote to memory of 1612 1184 Explorer.EXE 30 PID 1612 wrote to memory of 976 1612 wscript.exe 31 PID 1612 wrote to memory of 976 1612 wscript.exe 31 PID 1612 wrote to memory of 976 1612 wscript.exe 31 PID 1612 wrote to memory of 976 1612 wscript.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS. 25.23.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS. 25.23.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS. 25.23.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS. 25.23.exe"3⤵PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS. 25.23.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS. 25.23.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS. 25.23.exe"3⤵
- Deletes itself
PID:976
-
-