Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
rDHL_AWB_907853880911.exe
Resource
win7-20230712-en
General
-
Target
rDHL_AWB_907853880911.exe
-
Size
689KB
-
MD5
00e2917356ad724e3f79e42da2b9b92d
-
SHA1
e564ed8660919c10570fbad143ffd1333b81fb47
-
SHA256
80c33b55bc86034d5aa09175c45672e6bd847ed97938512772926f0d9285dce4
-
SHA512
0feb020dca29a31ec7bf0e6ba21bfb80c3b6541b92afc382594058de338536aa535c1dfe16346e400e786b29e0deec65d904c70643e93985724a7fdb01f25327
-
SSDEEP
12288:W5MYNp8wGcM1iwYa3ZOVv5A1zoiGz5BNvS9x8Z9YzzjbN:W6MuWa3ZOnIzoPz5BI9x8/
Malware Config
Extracted
formbook
4.1
f1w6
yourcomplexproject.com
ceoclubonline.com
omkararts.com
oldiefans.info
kalendrgptapp37.com
expetowing.com
531008.com
shguojibu.com
proartesmarciales.com
mlo564.xyz
canada-topsales.com
your-local-girls.info
hitroader.com
hoagiepalooza.site
wallstreetbull.online
pw786.vip
salamcleaning.com
carbon-cars.com
playacabarete.net
ifgfunds.com
travelgirlboutique.com
totoapang27.shop
haileylox.com
xcrunxc.net
resgirls.com
bricoluxury.com
netgies.xyz
venuegirl.com
puspitasnack.online
assimou.com
fluxfactorfuel.com
oldedirtroad.com
droyztech.com
noriyosi.com
bao1888.site
tfrksr.boats
yaautomative.com
tundraequal.site
realitykitgame.com
5577127.com
kzyky.top
genesiscomercializadora.com
arubaconsulting.cloud
m2venturesinc.com
junk2recycle.com
coast2coastcleaning.com
jwanzheng.com
kdlmachining.com
afschaffer.com
scottswann.com
haitucn.info
elixircollagenrush.com
ym11z.shop
bestsuppliespetstore.website
teamnordquist.com
fireandmettle.com
006bo.com
aoxnt.com
wjh555.vip
crmhybridai.com
delidl.com
gmlioe58v.fun
c-natura.live
yuyl.top
1chaojiqian.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4784-142-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4784-147-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3796-152-0x0000000000B90000-0x0000000000BBF000-memory.dmp formbook behavioral2/memory/3796-155-0x0000000000B90000-0x0000000000BBF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3332 set thread context of 4784 3332 rDHL_AWB_907853880911.exe 106 PID 4784 set thread context of 3176 4784 rDHL_AWB_907853880911.exe 64 PID 3796 set thread context of 3176 3796 control.exe 64 -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3332 rDHL_AWB_907853880911.exe 3332 rDHL_AWB_907853880911.exe 3332 rDHL_AWB_907853880911.exe 3332 rDHL_AWB_907853880911.exe 3332 rDHL_AWB_907853880911.exe 3332 rDHL_AWB_907853880911.exe 4784 rDHL_AWB_907853880911.exe 4784 rDHL_AWB_907853880911.exe 4784 rDHL_AWB_907853880911.exe 4784 rDHL_AWB_907853880911.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe 3796 control.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3176 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4784 rDHL_AWB_907853880911.exe 4784 rDHL_AWB_907853880911.exe 4784 rDHL_AWB_907853880911.exe 3796 control.exe 3796 control.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3332 rDHL_AWB_907853880911.exe Token: SeDebugPrivilege 4784 rDHL_AWB_907853880911.exe Token: SeDebugPrivilege 3796 control.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3176 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3332 wrote to memory of 4784 3332 rDHL_AWB_907853880911.exe 106 PID 3332 wrote to memory of 4784 3332 rDHL_AWB_907853880911.exe 106 PID 3332 wrote to memory of 4784 3332 rDHL_AWB_907853880911.exe 106 PID 3332 wrote to memory of 4784 3332 rDHL_AWB_907853880911.exe 106 PID 3332 wrote to memory of 4784 3332 rDHL_AWB_907853880911.exe 106 PID 3332 wrote to memory of 4784 3332 rDHL_AWB_907853880911.exe 106 PID 3176 wrote to memory of 3796 3176 Explorer.EXE 107 PID 3176 wrote to memory of 3796 3176 Explorer.EXE 107 PID 3176 wrote to memory of 3796 3176 Explorer.EXE 107 PID 3796 wrote to memory of 1872 3796 control.exe 108 PID 3796 wrote to memory of 1872 3796 control.exe 108 PID 3796 wrote to memory of 1872 3796 control.exe 108
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\rDHL_AWB_907853880911.exe"C:\Users\Admin\AppData\Local\Temp\rDHL_AWB_907853880911.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\rDHL_AWB_907853880911.exe"C:\Users\Admin\AppData\Local\Temp\rDHL_AWB_907853880911.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\rDHL_AWB_907853880911.exe"3⤵PID:1872
-
-