Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2023 05:06
Static task
static1
Behavioral task
behavioral1
Sample
SHIPPING DOCUMENTS. 25.23.exe
Resource
win7-20230220-en
General
-
Target
SHIPPING DOCUMENTS. 25.23.exe
-
Size
670KB
-
MD5
77783c6f99127280ab5c677c1c96bf7c
-
SHA1
5327e4ca332aa28267444a12cd692375291a4ce2
-
SHA256
e8f271e2c00c7310ba76f5be24f425df7b4c3fdd84a0b715906a10da4f7e879b
-
SHA512
e134cecc97558e46ee9b26cc1c6a818fd3697360d62a171aa2912900cfbf569a8aedc2de6e466d42f9401f964319af36203c389af46332d40bce2390bed1ef91
-
SSDEEP
12288:S8RXgHLZIcZI13TZFseMdvkp/TpVMYEVxhe+XbeG7aEGONgLQ:SsAtDmJZTu8ptipSupf
Malware Config
Extracted
formbook
4.1
ga36
700kitchen.com
udda.app
fractionalgc.tech
tipmercados.net
2-upapparel.net
directbookdiscount.com
koewetzeltours.com
d7c8-iuxt.com
hamaancook.com
benjaimnmoore.com
yimaglobal.africa
dispovapo.com
aseguvenlik.com
battery-worth.com
dddanbao.mobi
blueskyauberge.com
740.mobi
betterbonella.com
liverally.club
czubao.com
elliotthead.com
borkr.one
drvnsat.net
coldwellbankersolar.com
cityofexpertise.co.uk
independentdentist.network
bladesofbeautybymichelle.com
gqf5y.com
astergab.com
eventinvite.rsvp
indyfurnitureguild.com
theunrelentingbrush.co.uk
concealedcarry.info
a-alphaxtraboost.com
21diasdegratitud.com
edlevostatus.se
hradvocaciacriminal.com
efefindustrious.buzz
arafat.xyz
jlhaoniu.com
citizensbank.top
eatzpizzeria.com
everestfunerak.com
thecovenscorner.co.uk
subskrebcstumer.com
calabatherapy.com
braces-cost-affordable.com
erinandjacob.com
hakkaqq.website
flymavis.com
9774.top
hcthi.com
ecommercecolcorp.com
blackbluejetfriday.com
fralu.tech
biohackinghealthspan.com
cumhuriyet.click
dynamicbingo.live
jonashaapp.store
intentionallivingsoul.com
careerguru.academy
mexob.online
calaaccessories.com
kolagaems.com
310003.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/1304-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1304-147-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1332-150-0x0000000001200000-0x000000000122F000-memory.dmp formbook behavioral2/memory/1332-152-0x0000000001200000-0x000000000122F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2076 set thread context of 1304 2076 SHIPPING DOCUMENTS. 25.23.exe 91 PID 1304 set thread context of 3228 1304 SHIPPING DOCUMENTS. 25.23.exe 51 PID 1332 set thread context of 3228 1332 netsh.exe 51 -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 1304 SHIPPING DOCUMENTS. 25.23.exe 1304 SHIPPING DOCUMENTS. 25.23.exe 1304 SHIPPING DOCUMENTS. 25.23.exe 1304 SHIPPING DOCUMENTS. 25.23.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe 1332 netsh.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1304 SHIPPING DOCUMENTS. 25.23.exe 1304 SHIPPING DOCUMENTS. 25.23.exe 1304 SHIPPING DOCUMENTS. 25.23.exe 1332 netsh.exe 1332 netsh.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1304 SHIPPING DOCUMENTS. 25.23.exe Token: SeDebugPrivilege 1332 netsh.exe Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE Token: SeShutdownPrivilege 3228 Explorer.EXE Token: SeCreatePagefilePrivilege 3228 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1304 2076 SHIPPING DOCUMENTS. 25.23.exe 91 PID 2076 wrote to memory of 1304 2076 SHIPPING DOCUMENTS. 25.23.exe 91 PID 2076 wrote to memory of 1304 2076 SHIPPING DOCUMENTS. 25.23.exe 91 PID 2076 wrote to memory of 1304 2076 SHIPPING DOCUMENTS. 25.23.exe 91 PID 2076 wrote to memory of 1304 2076 SHIPPING DOCUMENTS. 25.23.exe 91 PID 2076 wrote to memory of 1304 2076 SHIPPING DOCUMENTS. 25.23.exe 91 PID 3228 wrote to memory of 1332 3228 Explorer.EXE 92 PID 3228 wrote to memory of 1332 3228 Explorer.EXE 92 PID 3228 wrote to memory of 1332 3228 Explorer.EXE 92 PID 1332 wrote to memory of 2224 1332 netsh.exe 93 PID 1332 wrote to memory of 2224 1332 netsh.exe 93 PID 1332 wrote to memory of 2224 1332 netsh.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS. 25.23.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS. 25.23.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS. 25.23.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS. 25.23.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS. 25.23.exe"3⤵PID:2224
-
-