Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
FedEx Express AWB#5305323204643.exe
Resource
win7-20240903-en
General
-
Target
FedEx Express AWB#5305323204643.exe
-
Size
675KB
-
MD5
3ae40912766339837da60e6a29e72791
-
SHA1
f7a3e4560435770745d04a9abf5ae4b88b29f2a9
-
SHA256
a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d
-
SHA512
88446cbf3de77af430bdd18c0d7932789fbe626b236b318701b3e6b1d362d8ac4f6166c84cc254594efa0be9307af4f11bcb3dcee8792e499239e39ad745ec41
-
SSDEEP
12288:4nCb+eCSmzZmUpNPGNOCQmO51NvC+lyh8A7/tbRTzJc:4uCBMwhGNxi9l4/Tz
Malware Config
Extracted
formbook
4.1
g92s
utomation-tools-55205.bond
commerce-99094.bond
ufounoufeng.vip
arkknighttransport.net
et9ja.webcam
75511.vip
afiabmfkrk.online
lluminos.live
egitfxtrade.live
zn-lab.net
implifiedprojects.net
mjsnnn5716.shop
ecurity-service-28490.bond
andy888th.online
dno.xyz
ofl.xyz
enamind.net
ellnessdigitalmedia.store
mcreative.studio
wctoken-v2.icu
ochnonevpn.online
amewith.auction
groupsrl.net
piro.style
hdqyp.shop
76v.lat
dzywkanaporostrzes.pro
nitypath.website
slami.store
erseus-global.net
52pq293kt.skin
duxrib.xyz
utosub.xyz
otorcycle-loans-21363.bond
acho.store
lay44.bet
olka.xyz
eelthevibe.xyz
reezedrybreastmilk.net
ythicsportswear.online
tatspw.online
x-design-courses-91526.bond
inhngoc.photos
kuxepe.info
rjeffbarry.online
unnylogistics.pro
eaponreadiness.net
69nyccoffee.shop
atiao.asia
eekend-warriors.website
umematch.net
arrefour-banque.business
ehuatang.online
hhls370824.sbs
manate.ltd
oodstocks.sbs
essicafilho.online
nline-mba-94006.bond
hreekalyanam.online
nline-advertising-57293.bond
nline-advertising-77795.bond
otorcycle-loans-81246.bond
olar-battery-13607.bond
nfluencer-marketing-27273.bond
igitalsells-corner.xyz
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2240-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2240-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2240-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2108-27-0x0000000000100000-0x000000000012F000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2124 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
FedEx Express AWB#5305323204643.exeFedEx Express AWB#5305323204643.exechkdsk.exedescription pid Process procid_target PID 2764 set thread context of 2240 2764 FedEx Express AWB#5305323204643.exe 30 PID 2240 set thread context of 1200 2240 FedEx Express AWB#5305323204643.exe 21 PID 2240 set thread context of 1200 2240 FedEx Express AWB#5305323204643.exe 21 PID 2108 set thread context of 1200 2108 chkdsk.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
FedEx Express AWB#5305323204643.exechkdsk.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FedEx Express AWB#5305323204643.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
FedEx Express AWB#5305323204643.exeFedEx Express AWB#5305323204643.exechkdsk.exepid Process 2764 FedEx Express AWB#5305323204643.exe 2764 FedEx Express AWB#5305323204643.exe 2240 FedEx Express AWB#5305323204643.exe 2240 FedEx Express AWB#5305323204643.exe 2240 FedEx Express AWB#5305323204643.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe 2108 chkdsk.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
FedEx Express AWB#5305323204643.exechkdsk.exepid Process 2240 FedEx Express AWB#5305323204643.exe 2240 FedEx Express AWB#5305323204643.exe 2240 FedEx Express AWB#5305323204643.exe 2240 FedEx Express AWB#5305323204643.exe 2108 chkdsk.exe 2108 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
FedEx Express AWB#5305323204643.exeFedEx Express AWB#5305323204643.exechkdsk.exedescription pid Process Token: SeDebugPrivilege 2764 FedEx Express AWB#5305323204643.exe Token: SeDebugPrivilege 2240 FedEx Express AWB#5305323204643.exe Token: SeDebugPrivilege 2108 chkdsk.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
FedEx Express AWB#5305323204643.exeExplorer.EXEchkdsk.exedescription pid Process procid_target PID 2764 wrote to memory of 2240 2764 FedEx Express AWB#5305323204643.exe 30 PID 2764 wrote to memory of 2240 2764 FedEx Express AWB#5305323204643.exe 30 PID 2764 wrote to memory of 2240 2764 FedEx Express AWB#5305323204643.exe 30 PID 2764 wrote to memory of 2240 2764 FedEx Express AWB#5305323204643.exe 30 PID 2764 wrote to memory of 2240 2764 FedEx Express AWB#5305323204643.exe 30 PID 2764 wrote to memory of 2240 2764 FedEx Express AWB#5305323204643.exe 30 PID 2764 wrote to memory of 2240 2764 FedEx Express AWB#5305323204643.exe 30 PID 1200 wrote to memory of 2108 1200 Explorer.EXE 43 PID 1200 wrote to memory of 2108 1200 Explorer.EXE 43 PID 1200 wrote to memory of 2108 1200 Explorer.EXE 43 PID 1200 wrote to memory of 2108 1200 Explorer.EXE 43 PID 2108 wrote to memory of 2124 2108 chkdsk.exe 44 PID 2108 wrote to memory of 2124 2108 chkdsk.exe 44 PID 2108 wrote to memory of 2124 2108 chkdsk.exe 44 PID 2108 wrote to memory of 2124 2108 chkdsk.exe 44
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\FedEx Express AWB#5305323204643.exe"C:\Users\Admin\AppData\Local\Temp\FedEx Express AWB#5305323204643.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\FedEx Express AWB#5305323204643.exe"C:\Users\Admin\AppData\Local\Temp\FedEx Express AWB#5305323204643.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:484
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:808
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1268
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2816
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:576
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:592
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:328
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:624
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1424
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1740
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3020
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\FedEx Express AWB#5305323204643.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2124
-
-