Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2023 09:54
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents.exe
Resource
win7-20230220-en
General
-
Target
Shipping Documents.exe
-
Size
1.1MB
-
MD5
501077473c7260aa94be655173c8ad40
-
SHA1
dc677d38541268f2c4a42eb8ba71a6960a04efb3
-
SHA256
34834d278c8c71e3cc9d152c073cc444781465c285648630a1be19afab1abd24
-
SHA512
17a8e6021f6dccb9b5848ca6bc02146bd4a8242cf51f6bacbf6b732e7d0e97297337df729b4fd1f7f0abc0a0756122f0fd2a8495416504be65b275208b7e2ae3
-
SSDEEP
12288:5TLaa0X6S2iN6dn1tWKeMTmHY31v8nhaIdpMdZHs747yr5i6cNOYV2nw:Y510313TC0JIdks7iIv1bw
Malware Config
Extracted
formbook
4.1
ca82
idunresearch.com
loiioo1.site
aimobilify.com
limousineswebdesign.com
darshan-enterprises.online
javad.top
dd-spy.com
metamysme.co.uk
earticlesdirect.com
ldkj78v.vip
dariusevory.com
bestyoutubepromoter.com
dogcoinacademy.com
mestredosexo.net
mrnofree.africa
plan.rsvp
hoangnam.site
cadcamperform.com
091888.net
artwaylogistics.com
bigsky1roofing.net
kr-eats.com
millenniumtutors.africa
clarebushire.com
amazonnews.top
farmacoachdigital.com
lasmeralda.net
baochuanlp.com
golf-break100again.com
kgconstrucoes.com
anamaciasdeharo.com
callgaryz.com
dbfsolutely.net
193yz96.xyz
yetcox.online
bet168.plus
lobbyspace.net
kui693.com
athm-consulting.com
warrenlee.africa
kellnovaglobalfood.info
premierpath.net
floffly.art
alaiatech.net
motherpearl.africa
daxiangya.com
mandytelecoms.africa
mbtglobal.africa
dazzleexchange.com
jacksontcpsettlement.com
gadjet1111.com
indiciacompany.com
artistpu.com
colonbroom-reviews.com
leaptrainings.com
harataka.com
athma.xyz
id6w.xyz
hakilakingllc.com
getripay.africa
comedyescape.show
lieblingsmusik.events
bridgerenvm.com
allard-electrical.com
kode-promo.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2032-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2032-148-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/5080-149-0x00000000009C0000-0x00000000009EF000-memory.dmp formbook behavioral2/memory/5080-151-0x00000000009C0000-0x00000000009EF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2616 set thread context of 2032 2616 Shipping Documents.exe 95 PID 2032 set thread context of 3116 2032 Shipping Documents.exe 54 PID 5080 set thread context of 3116 5080 cmmon32.exe 54 -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2616 Shipping Documents.exe 2616 Shipping Documents.exe 2616 Shipping Documents.exe 2616 Shipping Documents.exe 2032 Shipping Documents.exe 2032 Shipping Documents.exe 2032 Shipping Documents.exe 2032 Shipping Documents.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe 5080 cmmon32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3116 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2032 Shipping Documents.exe 2032 Shipping Documents.exe 2032 Shipping Documents.exe 5080 cmmon32.exe 5080 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2616 Shipping Documents.exe Token: SeDebugPrivilege 2032 Shipping Documents.exe Token: SeDebugPrivilege 5080 cmmon32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2616 wrote to memory of 4640 2616 Shipping Documents.exe 93 PID 2616 wrote to memory of 4640 2616 Shipping Documents.exe 93 PID 2616 wrote to memory of 4640 2616 Shipping Documents.exe 93 PID 2616 wrote to memory of 4460 2616 Shipping Documents.exe 94 PID 2616 wrote to memory of 4460 2616 Shipping Documents.exe 94 PID 2616 wrote to memory of 4460 2616 Shipping Documents.exe 94 PID 2616 wrote to memory of 2032 2616 Shipping Documents.exe 95 PID 2616 wrote to memory of 2032 2616 Shipping Documents.exe 95 PID 2616 wrote to memory of 2032 2616 Shipping Documents.exe 95 PID 2616 wrote to memory of 2032 2616 Shipping Documents.exe 95 PID 2616 wrote to memory of 2032 2616 Shipping Documents.exe 95 PID 2616 wrote to memory of 2032 2616 Shipping Documents.exe 95 PID 3116 wrote to memory of 5080 3116 Explorer.EXE 96 PID 3116 wrote to memory of 5080 3116 Explorer.EXE 96 PID 3116 wrote to memory of 5080 3116 Explorer.EXE 96 PID 5080 wrote to memory of 3716 5080 cmmon32.exe 97 PID 5080 wrote to memory of 3716 5080 cmmon32.exe 97 PID 5080 wrote to memory of 3716 5080 cmmon32.exe 97
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"3⤵PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"3⤵PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"3⤵PID:3716
-
-