Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
Shipment Notification.exe
Resource
win7-20240729-en
General
-
Target
Shipment Notification.exe
-
Size
339KB
-
MD5
4051f49c770d335749e6bc72f5aa9c98
-
SHA1
8a88643c75588960adf3efb1d37ebfd126f25b3c
-
SHA256
57970209107e8f230a66a3573e21b65ca46a5445554544948af6cdd27f144bf0
-
SHA512
0b43412e7f471e6dbdb8e94a69ad03cf688b68be5f00aca87d9233833a0c808687235a2b2ccfae5a4db8c32fb7b938b9bc90cfc27829631d56ff3ea3a724b5d0
-
SSDEEP
6144:AEbkSsHZgpaxPXzWUXGRSK+pzfb6g/XRis76zXn9x1MVgjYf:AW2aSjN2+pKgP49xrY
Malware Config
Extracted
formbook
4.1
nm5
realestatecaffe.com
fetels.com
starvenus.world
dejashannon.com
zali.ltd
shangyuanfushi.com
socialmediagent.com
alphaomega.team
p3lp4.net
narandina.com
equfiaxsecurity2017.com
tribeofchristians.com
yutangke.com
lequf.com
ecabuyukcekmece.net
onlinexclip.com
harmonitza.com
velvetpelvis.com
manlexue.net
curtainspy.com
aarontocenter.com
btrbzz.com
cultureshock.biz
testci20170905024542.net
wwwjinsha956.com
sophrologue-paris17.com
fclpu.info
tillyaev.life
buyuyenhalka.com
pariscollinsgroup.com
318jrsy.com
ads-apcsk.com
blogger2016.com
trasderv.net
freshjunkremovalaustin.com
jjjcbyxz.com
peterpandreams.com
your-casino-chance.com
chiaksimi.com
xn--ur0asus29a.com
world-trip.com
beautysas.com
bbmrteam.com
aicluster.net
vulcanoestudio.com
mesdaespecialonline.com
bungerde.com
i-spark.fr
helpfort.com
cqjlgn.loan
deandveri.com
xn--ghqv4ymkh.ink
teresahennessy.com
f3hdh.info
orugidodoleao.com
gymnastics-coach.com
climatecancel.com
votreoffre-speciale.net
tongzhou.ink
adeusdepressao.com
adwokatura.info
niu-a.com
prepaidfund.com
delcieloastrologia.com
doneym.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2500-1-0x0000000001E20000-0x0000000001F20000-memory.dmp formbook behavioral1/memory/2500-4-0x0000000001E20000-0x0000000001F20000-memory.dmp formbook behavioral1/memory/2500-8-0x0000000001E20000-0x0000000001F20000-memory.dmp formbook behavioral1/memory/2500-9-0x0000000001E20000-0x0000000001F20000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2704 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2500 set thread context of 1212 2500 Shipment Notification.exe 21 PID 2500 set thread context of 1212 2500 Shipment Notification.exe 21 PID 2820 set thread context of 1212 2820 cmstp.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shipment Notification.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2500 Shipment Notification.exe 2500 Shipment Notification.exe 2500 Shipment Notification.exe 2820 cmstp.exe 2820 cmstp.exe 2820 cmstp.exe 2820 cmstp.exe 2820 cmstp.exe 2820 cmstp.exe 2820 cmstp.exe 2820 cmstp.exe 2820 cmstp.exe 2820 cmstp.exe 2820 cmstp.exe 2820 cmstp.exe 2820 cmstp.exe 2820 cmstp.exe 2820 cmstp.exe 2820 cmstp.exe 2820 cmstp.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2500 Shipment Notification.exe 2500 Shipment Notification.exe 2500 Shipment Notification.exe 2500 Shipment Notification.exe 2820 cmstp.exe 2820 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2500 Shipment Notification.exe Token: SeDebugPrivilege 2820 cmstp.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1212 wrote to memory of 2820 1212 Explorer.EXE 32 PID 1212 wrote to memory of 2820 1212 Explorer.EXE 32 PID 1212 wrote to memory of 2820 1212 Explorer.EXE 32 PID 1212 wrote to memory of 2820 1212 Explorer.EXE 32 PID 1212 wrote to memory of 2820 1212 Explorer.EXE 32 PID 1212 wrote to memory of 2820 1212 Explorer.EXE 32 PID 1212 wrote to memory of 2820 1212 Explorer.EXE 32 PID 2820 wrote to memory of 2704 2820 cmstp.exe 33 PID 2820 wrote to memory of 2704 2820 cmstp.exe 33 PID 2820 wrote to memory of 2704 2820 cmstp.exe 33 PID 2820 wrote to memory of 2704 2820 cmstp.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Shipment Notification.exe"C:\Users\Admin\AppData\Local\Temp\Shipment Notification.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Shipment Notification.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2704
-
-