Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2023, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
DHL_AWB_907853880911.exe
Resource
win7-20230712-en
General
-
Target
DHL_AWB_907853880911.exe
-
Size
599KB
-
MD5
84783a2493baf6e8db916c57e81f90bc
-
SHA1
bb4360a60ae5d25d1d90790ee993de7a1a0f5ed2
-
SHA256
556c89d97bff251e5a6e5db0b9e7dc69f11752758538ecbba759c9347ae4b2a9
-
SHA512
52c971a43bdd8e5030a9f7472b4e510e700d7227f52d66fa3a1f907a1b1ea7cc6f6ffd3b3801f985a8d2f141c140ded2fcca12cb9c188875e463bd9d8b8a7c6f
-
SSDEEP
12288:MgniF9czTFlkDiVgWMLudJ9eJP2+LbxowdZWUMMytEAiV5:MgniUPFkiPXgJTbew3WUfyN+
Malware Config
Extracted
formbook
4.1
f1w6
yourcomplexproject.com
ceoclubonline.com
omkararts.com
oldiefans.info
kalendrgptapp37.com
expetowing.com
531008.com
shguojibu.com
proartesmarciales.com
mlo564.xyz
canada-topsales.com
your-local-girls.info
hitroader.com
hoagiepalooza.site
wallstreetbull.online
pw786.vip
salamcleaning.com
carbon-cars.com
playacabarete.net
ifgfunds.com
travelgirlboutique.com
totoapang27.shop
haileylox.com
xcrunxc.net
resgirls.com
bricoluxury.com
netgies.xyz
venuegirl.com
puspitasnack.online
assimou.com
fluxfactorfuel.com
oldedirtroad.com
droyztech.com
noriyosi.com
bao1888.site
tfrksr.boats
yaautomative.com
tundraequal.site
realitykitgame.com
5577127.com
kzyky.top
genesiscomercializadora.com
arubaconsulting.cloud
m2venturesinc.com
junk2recycle.com
coast2coastcleaning.com
jwanzheng.com
kdlmachining.com
afschaffer.com
scottswann.com
haitucn.info
elixircollagenrush.com
ym11z.shop
bestsuppliespetstore.website
teamnordquist.com
fireandmettle.com
006bo.com
aoxnt.com
wjh555.vip
crmhybridai.com
delidl.com
gmlioe58v.fun
c-natura.live
yuyl.top
1chaojiqian.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/1416-142-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1416-147-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/736-152-0x0000000000A90000-0x0000000000ABF000-memory.dmp formbook behavioral2/memory/736-154-0x0000000000A90000-0x0000000000ABF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4480 set thread context of 1416 4480 DHL_AWB_907853880911.exe 89 PID 1416 set thread context of 3168 1416 DHL_AWB_907853880911.exe 44 PID 736 set thread context of 3168 736 systray.exe 44 -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4480 DHL_AWB_907853880911.exe 4480 DHL_AWB_907853880911.exe 4480 DHL_AWB_907853880911.exe 4480 DHL_AWB_907853880911.exe 4480 DHL_AWB_907853880911.exe 4480 DHL_AWB_907853880911.exe 1416 DHL_AWB_907853880911.exe 1416 DHL_AWB_907853880911.exe 1416 DHL_AWB_907853880911.exe 1416 DHL_AWB_907853880911.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe 736 systray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3168 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1416 DHL_AWB_907853880911.exe 1416 DHL_AWB_907853880911.exe 1416 DHL_AWB_907853880911.exe 736 systray.exe 736 systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4480 DHL_AWB_907853880911.exe Token: SeDebugPrivilege 1416 DHL_AWB_907853880911.exe Token: SeDebugPrivilege 736 systray.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4480 wrote to memory of 1416 4480 DHL_AWB_907853880911.exe 89 PID 4480 wrote to memory of 1416 4480 DHL_AWB_907853880911.exe 89 PID 4480 wrote to memory of 1416 4480 DHL_AWB_907853880911.exe 89 PID 4480 wrote to memory of 1416 4480 DHL_AWB_907853880911.exe 89 PID 4480 wrote to memory of 1416 4480 DHL_AWB_907853880911.exe 89 PID 4480 wrote to memory of 1416 4480 DHL_AWB_907853880911.exe 89 PID 3168 wrote to memory of 736 3168 Explorer.EXE 90 PID 3168 wrote to memory of 736 3168 Explorer.EXE 90 PID 3168 wrote to memory of 736 3168 Explorer.EXE 90 PID 736 wrote to memory of 4912 736 systray.exe 91 PID 736 wrote to memory of 4912 736 systray.exe 91 PID 736 wrote to memory of 4912 736 systray.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\DHL_AWB_907853880911.exe"C:\Users\Admin\AppData\Local\Temp\DHL_AWB_907853880911.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\DHL_AWB_907853880911.exe"C:\Users\Admin\AppData\Local\Temp\DHL_AWB_907853880911.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL_AWB_907853880911.exe"3⤵PID:4912
-
-