Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23/05/2023, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
Resource
win7-20230220-en
General
-
Target
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
-
Size
661KB
-
MD5
52884584e2bbbd4506596bf9cdebd4f1
-
SHA1
2d1a5c85486065bb8e947148ab2d0b22d87da8ef
-
SHA256
250a1e2888f6048ef783f5b580b000127d052371042c70b25497fe000ea662b5
-
SHA512
f807fa5abb52d9acbda3fc4f680324526fb7f898f844503d8df57bfa24f5391b23ba4dcb1471cc233a88c1aefc4bd558201c698edfb8a1623faf741f7faadeeb
-
SSDEEP
12288:E2iN/tAqWV7ej9J7k5LXkW/qXo59YPHcnN/tqjg8ca:E1htAX0j9wkR8nN/Ejg8ca
Malware Config
Extracted
formbook
4.1
upa6
farmaciadelverde.com
1whcfc.top
djameshomes.com
kylepauley.social
dawncharitabletrust.com
leverdurable.com
bluxban.online
oceansideglass.net
pcdcompusoft.com
dlunion.net
continuumadvisorypartners.com
tvlfood.com
pillblue.co.uk
1win-site-3.top
e32mbe.shop
mawelk.xyz
garage365.online
commonwealthbank.online
xw-04.com
smartcitiesrecruitment.co.uk
1wehuc.top
dydx.ltd
signssouthport.uk
tirumanam.rsvp
glenhome.org.uk
chiscocity.africa
butshuimuch.com
betkfurniture.com
palworld.net
louiserafton.co.uk
gevorgianvocalcoach.com
furioutgfb.space
cocohouselabarra.com
weddingplannerguide.africa
frioriver.net
doscervezabebidas.com
nigerianewscentral.africa
chenyuxi.love
4zk.xyz
druckrohrsanierung.info
hgaerosquadron.com
mediadl.net
arthalloys.com
angrygoosegear.com
adopt8x.com
enchante.fun
ivhydrationbarplus.net
1whfch.top
greenvibes.community
calculator-kasko-spb.ru
alanducnguyen.com
590nightingale.com
ilmagazzinodigilgamesh.com
huynhi.info
feiduyang.com
laundryemas.top
coalbros.com
intretechw.com
aurabodystudio.com
mwordconsulting.co.uk
cj-optic.co.uk
hyperjmp.com
asty668.com
efefhabitual.buzz
fanvilintercom.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/1192-64-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1192-67-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1168-72-0x0000000000090000-0x00000000000BF000-memory.dmp formbook behavioral1/memory/1168-74-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Blocklisted process makes network request 1 IoCs
flow pid Process 13 1168 cmstp.exe -
Deletes itself 1 IoCs
pid Process 1512 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1568 set thread context of 1192 1568 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 28 PID 1192 set thread context of 1272 1192 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 13 PID 1168 set thread context of 1272 1168 cmstp.exe 13 -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1192 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 1192 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 1168 cmstp.exe 1168 cmstp.exe 1168 cmstp.exe 1168 cmstp.exe 1168 cmstp.exe 1168 cmstp.exe 1168 cmstp.exe 1168 cmstp.exe 1168 cmstp.exe 1168 cmstp.exe 1168 cmstp.exe 1168 cmstp.exe 1168 cmstp.exe 1168 cmstp.exe 1168 cmstp.exe 1168 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1272 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1192 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 1192 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 1192 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 1168 cmstp.exe 1168 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1192 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe Token: SeDebugPrivilege 1168 cmstp.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1272 Explorer.EXE 1272 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1272 Explorer.EXE 1272 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1192 1568 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 28 PID 1568 wrote to memory of 1192 1568 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 28 PID 1568 wrote to memory of 1192 1568 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 28 PID 1568 wrote to memory of 1192 1568 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 28 PID 1568 wrote to memory of 1192 1568 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 28 PID 1568 wrote to memory of 1192 1568 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 28 PID 1568 wrote to memory of 1192 1568 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 28 PID 1272 wrote to memory of 1168 1272 Explorer.EXE 29 PID 1272 wrote to memory of 1168 1272 Explorer.EXE 29 PID 1272 wrote to memory of 1168 1272 Explorer.EXE 29 PID 1272 wrote to memory of 1168 1272 Explorer.EXE 29 PID 1272 wrote to memory of 1168 1272 Explorer.EXE 29 PID 1272 wrote to memory of 1168 1272 Explorer.EXE 29 PID 1272 wrote to memory of 1168 1272 Explorer.EXE 29 PID 1168 wrote to memory of 1512 1168 cmstp.exe 30 PID 1168 wrote to memory of 1512 1168 cmstp.exe 30 PID 1168 wrote to memory of 1512 1168 cmstp.exe 30 PID 1168 wrote to memory of 1512 1168 cmstp.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"C:\Users\Admin\AppData\Local\Temp\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"C:\Users\Admin\AppData\Local\Temp\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"3⤵
- Deletes itself
PID:1512
-
-