Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2023, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
DHL Receipt276334VWE.exe
Resource
win7-20230220-en
General
-
Target
DHL Receipt276334VWE.exe
-
Size
253KB
-
MD5
b6f80ee925e9745fb5305429f1ce1a74
-
SHA1
c1d19e16638195fd2fdf8e4adabea6d1b25a8681
-
SHA256
321691557b39805530f57b29887ab32e5ddd81ad080ac4d91d964c978fbc6b04
-
SHA512
1ec6563bdd4d073008b796c5ae307d77012904faee0dbc0197d099018cf5a37f2e32370001018a61758d2269a506373457b9d0ccfc6a2a3e8891fae230e10f2b
-
SSDEEP
6144:/Ya6RZ7+pUU4mnLG7nwjhtwa9sIStaIR125jJvTMa2R:/YDZ7KUVmnLG7nwjZ2JaIR1UTbi
Malware Config
Extracted
formbook
4.1
j0c7
dvyuansu.com
flyersfirst.com
lbvasd.xyz
samodeling.com
lsty.net
agreels.com
gptvai.com
tyec.xyz
infercn.top
restinpeace.website
flaxtest.com
manaroo.com
altyazi-hub.xyz
devrijeweide.store
thebestfurnitureplace.com
combatsportsacademyus.com
segui276.pics
starseedalignment.com
fish-pay.com
letsbet.life
ios777cpf.top
mobinaalimanesh.sbs
getbeelu.com
ythqq.com
wdrkasa564.online
sinyalbuton.net
khandoba.homes
realdize.com
futurebuilding.community
falconmaritimellc.com
seacrawlers.com
thealightmotionmod.com
g6mnt.xyz
quotesonvideo.site
dynastydextools.com
client23-portal.com
00869.live
maisonhayaat.com
amadeusliu.xyz
raygradys.com
stoicplanning.com
azulcannabis.com
sticktogetherbr.com
534atjewish.store
reksaindra.com
iiii.website
yyz63.com
jinchunxi.com
rsethan.com
ghgoonline.com
prospectstrata.com
mm44s.com
highsiddle.com
xn--68j011g8slt1hlv3c.site
maestris-prepa.com
lwdingyi.com
mostafa-mahmoud.club
biopale.com
insnexshop.com
nateandkelly1915.com
sinyalbuton.net
fbkjacn69.pics
pornhub.support
pb22362.com
riz-moj.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4288-141-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4288-145-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3564-152-0x00000000010A0000-0x00000000010CF000-memory.dmp formbook behavioral2/memory/3564-154-0x00000000010A0000-0x00000000010CF000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
pid Process 2480 DHL Receipt276334VWE.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2480 set thread context of 4288 2480 DHL Receipt276334VWE.exe 83 PID 4288 set thread context of 3204 4288 DHL Receipt276334VWE.exe 46 PID 3564 set thread context of 3204 3564 cmmon32.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 4288 DHL Receipt276334VWE.exe 4288 DHL Receipt276334VWE.exe 4288 DHL Receipt276334VWE.exe 4288 DHL Receipt276334VWE.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe 3564 cmmon32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3204 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2480 DHL Receipt276334VWE.exe 4288 DHL Receipt276334VWE.exe 4288 DHL Receipt276334VWE.exe 4288 DHL Receipt276334VWE.exe 3564 cmmon32.exe 3564 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4288 DHL Receipt276334VWE.exe Token: SeDebugPrivilege 3564 cmmon32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2480 wrote to memory of 4288 2480 DHL Receipt276334VWE.exe 83 PID 2480 wrote to memory of 4288 2480 DHL Receipt276334VWE.exe 83 PID 2480 wrote to memory of 4288 2480 DHL Receipt276334VWE.exe 83 PID 2480 wrote to memory of 4288 2480 DHL Receipt276334VWE.exe 83 PID 3204 wrote to memory of 3564 3204 Explorer.EXE 85 PID 3204 wrote to memory of 3564 3204 Explorer.EXE 85 PID 3204 wrote to memory of 3564 3204 Explorer.EXE 85 PID 3564 wrote to memory of 1272 3564 cmmon32.exe 88 PID 3564 wrote to memory of 1272 3564 cmmon32.exe 88 PID 3564 wrote to memory of 1272 3564 cmmon32.exe 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\DHL Receipt276334VWE.exe"C:\Users\Admin\AppData\Local\Temp\DHL Receipt276334VWE.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\DHL Receipt276334VWE.exe"C:\Users\Admin\AppData\Local\Temp\DHL Receipt276334VWE.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:4800
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL Receipt276334VWE.exe"3⤵PID:1272
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5a7d4f2328803da6d4c3099267d5e6f6e
SHA1da374b32542513ddf1085f59dbdcd98f7d25cbd7
SHA256220f8168831410ae1876665fa2022c863dbe26918ecbcedc52a356c47919ebcf
SHA512ed58001ba41ada9e6988b78963e685a071e2a2cd0ffda0a6d6f92452d0c610a84f2795dc47d1998bbaff1ab2271897010b214ada824db94cb4634222642392eb