Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
02/08/2023, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
rDHL_AWB_907853880911.exe
Resource
win7-20230712-en
General
-
Target
rDHL_AWB_907853880911.exe
-
Size
689KB
-
MD5
00e2917356ad724e3f79e42da2b9b92d
-
SHA1
e564ed8660919c10570fbad143ffd1333b81fb47
-
SHA256
80c33b55bc86034d5aa09175c45672e6bd847ed97938512772926f0d9285dce4
-
SHA512
0feb020dca29a31ec7bf0e6ba21bfb80c3b6541b92afc382594058de338536aa535c1dfe16346e400e786b29e0deec65d904c70643e93985724a7fdb01f25327
-
SSDEEP
12288:W5MYNp8wGcM1iwYa3ZOVv5A1zoiGz5BNvS9x8Z9YzzjbN:W6MuWa3ZOnIzoPz5BI9x8/
Malware Config
Extracted
formbook
4.1
f1w6
yourcomplexproject.com
ceoclubonline.com
omkararts.com
oldiefans.info
kalendrgptapp37.com
expetowing.com
531008.com
shguojibu.com
proartesmarciales.com
mlo564.xyz
canada-topsales.com
your-local-girls.info
hitroader.com
hoagiepalooza.site
wallstreetbull.online
pw786.vip
salamcleaning.com
carbon-cars.com
playacabarete.net
ifgfunds.com
travelgirlboutique.com
totoapang27.shop
haileylox.com
xcrunxc.net
resgirls.com
bricoluxury.com
netgies.xyz
venuegirl.com
puspitasnack.online
assimou.com
fluxfactorfuel.com
oldedirtroad.com
droyztech.com
noriyosi.com
bao1888.site
tfrksr.boats
yaautomative.com
tundraequal.site
realitykitgame.com
5577127.com
kzyky.top
genesiscomercializadora.com
arubaconsulting.cloud
m2venturesinc.com
junk2recycle.com
coast2coastcleaning.com
jwanzheng.com
kdlmachining.com
afschaffer.com
scottswann.com
haitucn.info
elixircollagenrush.com
ym11z.shop
bestsuppliespetstore.website
teamnordquist.com
fireandmettle.com
006bo.com
aoxnt.com
wjh555.vip
crmhybridai.com
delidl.com
gmlioe58v.fun
c-natura.live
yuyl.top
1chaojiqian.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2256-65-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2256-69-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2764-75-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/2764-77-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2540 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1684 set thread context of 2256 1684 rDHL_AWB_907853880911.exe 31 PID 2256 set thread context of 1328 2256 rDHL_AWB_907853880911.exe 10 PID 2764 set thread context of 1328 2764 ipconfig.exe 10 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2764 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1684 rDHL_AWB_907853880911.exe 1684 rDHL_AWB_907853880911.exe 1684 rDHL_AWB_907853880911.exe 1684 rDHL_AWB_907853880911.exe 1684 rDHL_AWB_907853880911.exe 1684 rDHL_AWB_907853880911.exe 1684 rDHL_AWB_907853880911.exe 1684 rDHL_AWB_907853880911.exe 2256 rDHL_AWB_907853880911.exe 2256 rDHL_AWB_907853880911.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe 2764 ipconfig.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1328 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2256 rDHL_AWB_907853880911.exe 2256 rDHL_AWB_907853880911.exe 2256 rDHL_AWB_907853880911.exe 2764 ipconfig.exe 2764 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1684 rDHL_AWB_907853880911.exe Token: SeDebugPrivilege 2256 rDHL_AWB_907853880911.exe Token: SeDebugPrivilege 2764 ipconfig.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2724 1684 rDHL_AWB_907853880911.exe 30 PID 1684 wrote to memory of 2724 1684 rDHL_AWB_907853880911.exe 30 PID 1684 wrote to memory of 2724 1684 rDHL_AWB_907853880911.exe 30 PID 1684 wrote to memory of 2724 1684 rDHL_AWB_907853880911.exe 30 PID 1684 wrote to memory of 2256 1684 rDHL_AWB_907853880911.exe 31 PID 1684 wrote to memory of 2256 1684 rDHL_AWB_907853880911.exe 31 PID 1684 wrote to memory of 2256 1684 rDHL_AWB_907853880911.exe 31 PID 1684 wrote to memory of 2256 1684 rDHL_AWB_907853880911.exe 31 PID 1684 wrote to memory of 2256 1684 rDHL_AWB_907853880911.exe 31 PID 1684 wrote to memory of 2256 1684 rDHL_AWB_907853880911.exe 31 PID 1684 wrote to memory of 2256 1684 rDHL_AWB_907853880911.exe 31 PID 1328 wrote to memory of 2764 1328 Explorer.EXE 32 PID 1328 wrote to memory of 2764 1328 Explorer.EXE 32 PID 1328 wrote to memory of 2764 1328 Explorer.EXE 32 PID 1328 wrote to memory of 2764 1328 Explorer.EXE 32 PID 2764 wrote to memory of 2540 2764 ipconfig.exe 33 PID 2764 wrote to memory of 2540 2764 ipconfig.exe 33 PID 2764 wrote to memory of 2540 2764 ipconfig.exe 33 PID 2764 wrote to memory of 2540 2764 ipconfig.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\rDHL_AWB_907853880911.exe"C:\Users\Admin\AppData\Local\Temp\rDHL_AWB_907853880911.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\rDHL_AWB_907853880911.exe"C:\Users\Admin\AppData\Local\Temp\rDHL_AWB_907853880911.exe"3⤵PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\rDHL_AWB_907853880911.exe"C:\Users\Admin\AppData\Local\Temp\rDHL_AWB_907853880911.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\rDHL_AWB_907853880911.exe"3⤵
- Deletes itself
PID:2540
-
-