Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
Delivery Advice_pdf.exe
Resource
win7-20230831-en
General
-
Target
Delivery Advice_pdf.exe
-
Size
599KB
-
MD5
6074ee36c8396cb9eb740fd7b17717b4
-
SHA1
54863bae13ae43c648e591bffd462fd21a8ae997
-
SHA256
63f0ca19b1c85d5ff157194089a45b59a76f7405e89eba21741afa81c00575b7
-
SHA512
4108db1c0725f808955705d8cb2edef004556c6cd4024eeb632ece4c05e60203b211f56da0276b161dc0ddd4f079c2f91b16c3abdcfad78f1aafdbf654716737
-
SSDEEP
12288:6dJP+NXCvoqzLEJkb/jcak1Jp18n/MZyxQQvUipjeX+jvv7:6dJPuCvoqLckzjcak778n/MZyGQsmeXq
Malware Config
Extracted
formbook
4.1
ls02
vocabularybot.com
invisalignsmilesolutions.xyz
sleepdisorderinsomnia.com
bern.beauty
ahazmcdris.top
21874960sie8ca1.store
yeitced.xyz
biggerpictureventures.com
alduhagroup.com
itsolutions.biz
0oq6y.com
wildpolis.com
mariobet469.com
brynnwpods.com
tastywin.com
cou2m1.com
newaitrucks.com
puremeans.studio
mitienda-la.com
jujuresorthotel.com
kmjdhq.com
2840vacations.com
recchia-assicura.com
danetresales.com
crashed.boats
canton404.com
bluetilestudio.com
dfcf68333.net
smartplusplatform.online
apotheekgemak.online
arsmassagii.com
keenly-digital.com
uptravelcrm.com
loftybud.com
djfiremangambia.com
dreamydesiresstudio.com
perezzuriagaarquitecto.com
alisseo.com
smnxp.com
dhsgnk.com
ernestveremu.com
e2owaz8zskz.asia
stannesnstyrrellspass.com
delimikrofon.com
commodityrisks.com
ghghhgettt22.top
biggestbasispoints.com
evelmeedical.com
sentrumsnytt.online
kingdom69amp.com
bhphub.com
k5h5v.com
wuliangysh12.cloud
annasutraasource.net
greatairconditioners1.buzz
subpaylive.com
assumablemortgagenetwork.com
flairity.tech
shoutart.com
miy9.icu
nebudali.com
bagishopping.com
baiyeba.com
nycoapartments.com
wisewolftdot.online
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4996-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4996-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4632-25-0x0000000000F80000-0x0000000000FAF000-memory.dmp formbook behavioral2/memory/4632-28-0x0000000000F80000-0x0000000000FAF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3376 set thread context of 4996 3376 Delivery Advice_pdf.exe 99 PID 4996 set thread context of 3148 4996 Delivery Advice_pdf.exe 42 PID 4632 set thread context of 3148 4632 WWAHost.exe 42 -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4996 Delivery Advice_pdf.exe 4996 Delivery Advice_pdf.exe 4996 Delivery Advice_pdf.exe 4996 Delivery Advice_pdf.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe 4632 WWAHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3148 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4996 Delivery Advice_pdf.exe 4996 Delivery Advice_pdf.exe 4996 Delivery Advice_pdf.exe 4632 WWAHost.exe 4632 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4996 Delivery Advice_pdf.exe Token: SeDebugPrivilege 4632 WWAHost.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3148 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3376 wrote to memory of 4996 3376 Delivery Advice_pdf.exe 99 PID 3376 wrote to memory of 4996 3376 Delivery Advice_pdf.exe 99 PID 3376 wrote to memory of 4996 3376 Delivery Advice_pdf.exe 99 PID 3376 wrote to memory of 4996 3376 Delivery Advice_pdf.exe 99 PID 3376 wrote to memory of 4996 3376 Delivery Advice_pdf.exe 99 PID 3376 wrote to memory of 4996 3376 Delivery Advice_pdf.exe 99 PID 3148 wrote to memory of 4632 3148 Explorer.EXE 101 PID 3148 wrote to memory of 4632 3148 Explorer.EXE 101 PID 3148 wrote to memory of 4632 3148 Explorer.EXE 101 PID 4632 wrote to memory of 2052 4632 WWAHost.exe 103 PID 4632 wrote to memory of 2052 4632 WWAHost.exe 103 PID 4632 wrote to memory of 2052 4632 WWAHost.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\Delivery Advice_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Delivery Advice_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\Delivery Advice_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Delivery Advice_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Delivery Advice_pdf.exe"3⤵PID:2052
-
-