Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31-07-2024 06:13
Static task
static1
Behavioral task
behavioral1
Sample
DHL Shipment Notification 5011586210.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
DHL Shipment Notification 5011586210.exe
Resource
win10v2004-20240730-en
General
-
Target
DHL Shipment Notification 5011586210.exe
-
Size
358KB
-
MD5
8ea0022fe9bfb7a53c0650a1991d9420
-
SHA1
65cca2488da8a1d479e2ef9745a27c7c2495f6c4
-
SHA256
51e2e890ac898a62cb6478414ac1079df55a036da252026d4f5c8f7f09e400b3
-
SHA512
c9129be7dcce8b5dd560e7c36d2177c7b5a6a88a41760db693b35d6b0e14d7293faead0c30a3386cd7be8238ac080a8aa59eff6d28a5269f492167a531e5f64f
-
SSDEEP
6144:zxanJ2WI0ahaqmvK4Cqwpu/e+gnoGpob9cAjkTfpYpPapkSd9ug7x8nInfxD6MR:z8nJ2WI0qaqmvK4Cq/hgoMWcAYTf+pPK
Malware Config
Extracted
formbook
4.1
mq3
clarksonassistivetech.com
sjzam6.com
designermarken-outlet.online
kampoengkurma.online
shamsmaltdrinks.com
d7r4u1.info
sportsboulder.com
snagabag31.com
am0rsexkreto.com
sj233.com
estaladores.online
icbjesusdenazaret.net
bobi-frs.net
steminvr.com
yoxi.ltd
aaronnational.com
charliezangelzagency.com
rolex218238.com
snacksejuice.com
educationgrants.site
powerciser.com
endemikhardwoods.com
runcessories.com
cock-or-ball.com
thehuyertrnes.com
consultaprobidad.info
changancloud.com
therryvanvreden.com
latableovale.com
springholdingsbnk.com
hugoph.com
sarealodinge.com
searchmakeup.com
eddiefigure.win
r-ev-ival.com
essentialassetstraining.net
yolandekouznetsov.com
lianxiaoshu.com
3dcellmodelscongress.com
xn--3bst11cpvj0o2a.com
enginardergisi.com
tams.rocks
askcopdtreatmentok.live
bncosmetics.com
greenerpharms.com
lettersfromsanta.email
spartanpronos.com
wwwx36599.com
julqe.com
dannyhustle.com
evevon.com
copycatfunnels.com
tzacg.com
eckgjx.men
izzymetics.com
uzhackteam.com
islandlifeaccounting.com
hnbxm.com
missyunita.com
scriptfail006.win
blackgirlgenius.com
herzfeldandrubin.com
operatorcloud.net
cielarkodesign.com
porcber.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1652-8-0x00000000006F0000-0x000000000071D000-memory.dmp formbook behavioral1/memory/1652-10-0x00000000006F0000-0x000000000071D000-memory.dmp formbook -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DHL Shipment Notification 5011586210.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 DHL Shipment Notification 5011586210.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1652 set thread context of 1228 1652 DHL Shipment Notification 5011586210.exe 21 PID 2748 set thread context of 1228 2748 wlanext.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHL Shipment Notification 5011586210.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1652 DHL Shipment Notification 5011586210.exe 1652 DHL Shipment Notification 5011586210.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe 2748 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1652 DHL Shipment Notification 5011586210.exe 1652 DHL Shipment Notification 5011586210.exe 1652 DHL Shipment Notification 5011586210.exe 2748 wlanext.exe 2748 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1652 DHL Shipment Notification 5011586210.exe Token: SeDebugPrivilege 2748 wlanext.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2748 1228 Explorer.EXE 30 PID 1228 wrote to memory of 2748 1228 Explorer.EXE 30 PID 1228 wrote to memory of 2748 1228 Explorer.EXE 30 PID 1228 wrote to memory of 2748 1228 Explorer.EXE 30 PID 2748 wrote to memory of 2644 2748 wlanext.exe 31 PID 2748 wrote to memory of 2644 2748 wlanext.exe 31 PID 2748 wrote to memory of 2644 2748 wlanext.exe 31 PID 2748 wrote to memory of 2644 2748 wlanext.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\DHL Shipment Notification 5011586210.exe"C:\Users\Admin\AppData\Local\Temp\DHL Shipment Notification 5011586210.exe"2⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL Shipment Notification 5011586210.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2644
-
-