Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
Shipment Notification.exe
Resource
win7-20240729-en
General
-
Target
Shipment Notification.exe
-
Size
339KB
-
MD5
4051f49c770d335749e6bc72f5aa9c98
-
SHA1
8a88643c75588960adf3efb1d37ebfd126f25b3c
-
SHA256
57970209107e8f230a66a3573e21b65ca46a5445554544948af6cdd27f144bf0
-
SHA512
0b43412e7f471e6dbdb8e94a69ad03cf688b68be5f00aca87d9233833a0c808687235a2b2ccfae5a4db8c32fb7b938b9bc90cfc27829631d56ff3ea3a724b5d0
-
SSDEEP
6144:AEbkSsHZgpaxPXzWUXGRSK+pzfb6g/XRis76zXn9x1MVgjYf:AW2aSjN2+pKgP49xrY
Malware Config
Extracted
formbook
4.1
nm5
realestatecaffe.com
fetels.com
starvenus.world
dejashannon.com
zali.ltd
shangyuanfushi.com
socialmediagent.com
alphaomega.team
p3lp4.net
narandina.com
equfiaxsecurity2017.com
tribeofchristians.com
yutangke.com
lequf.com
ecabuyukcekmece.net
onlinexclip.com
harmonitza.com
velvetpelvis.com
manlexue.net
curtainspy.com
aarontocenter.com
btrbzz.com
cultureshock.biz
testci20170905024542.net
wwwjinsha956.com
sophrologue-paris17.com
fclpu.info
tillyaev.life
buyuyenhalka.com
pariscollinsgroup.com
318jrsy.com
ads-apcsk.com
blogger2016.com
trasderv.net
freshjunkremovalaustin.com
jjjcbyxz.com
peterpandreams.com
your-casino-chance.com
chiaksimi.com
xn--ur0asus29a.com
world-trip.com
beautysas.com
bbmrteam.com
aicluster.net
vulcanoestudio.com
mesdaespecialonline.com
bungerde.com
i-spark.fr
helpfort.com
cqjlgn.loan
deandveri.com
xn--ghqv4ymkh.ink
teresahennessy.com
f3hdh.info
orugidodoleao.com
gymnastics-coach.com
climatecancel.com
votreoffre-speciale.net
tongzhou.ink
adeusdepressao.com
adwokatura.info
niu-a.com
prepaidfund.com
delcieloastrologia.com
doneym.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/3700-1-0x0000000002300000-0x0000000002400000-memory.dmp formbook behavioral2/memory/3700-4-0x0000000002300000-0x0000000002400000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3700 set thread context of 3432 3700 Shipment Notification.exe 56 PID 2712 set thread context of 3432 2712 msdt.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shipment Notification.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 3700 Shipment Notification.exe 3700 Shipment Notification.exe 3700 Shipment Notification.exe 3700 Shipment Notification.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe 2712 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3700 Shipment Notification.exe 3700 Shipment Notification.exe 3700 Shipment Notification.exe 2712 msdt.exe 2712 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3700 Shipment Notification.exe Token: SeDebugPrivilege 2712 msdt.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3432 wrote to memory of 2712 3432 Explorer.EXE 92 PID 3432 wrote to memory of 2712 3432 Explorer.EXE 92 PID 3432 wrote to memory of 2712 3432 Explorer.EXE 92 PID 2712 wrote to memory of 3064 2712 msdt.exe 93 PID 2712 wrote to memory of 3064 2712 msdt.exe 93 PID 2712 wrote to memory of 3064 2712 msdt.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\Shipment Notification.exe"C:\Users\Admin\AppData\Local\Temp\Shipment Notification.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Shipment Notification.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-