Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
FedEx Express AWB#5305323204643.exe
Resource
win7-20240903-en
General
-
Target
FedEx Express AWB#5305323204643.exe
-
Size
675KB
-
MD5
3ae40912766339837da60e6a29e72791
-
SHA1
f7a3e4560435770745d04a9abf5ae4b88b29f2a9
-
SHA256
a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d
-
SHA512
88446cbf3de77af430bdd18c0d7932789fbe626b236b318701b3e6b1d362d8ac4f6166c84cc254594efa0be9307af4f11bcb3dcee8792e499239e39ad745ec41
-
SSDEEP
12288:4nCb+eCSmzZmUpNPGNOCQmO51NvC+lyh8A7/tbRTzJc:4uCBMwhGNxi9l4/Tz
Malware Config
Extracted
formbook
4.1
g92s
utomation-tools-55205.bond
commerce-99094.bond
ufounoufeng.vip
arkknighttransport.net
et9ja.webcam
75511.vip
afiabmfkrk.online
lluminos.live
egitfxtrade.live
zn-lab.net
implifiedprojects.net
mjsnnn5716.shop
ecurity-service-28490.bond
andy888th.online
dno.xyz
ofl.xyz
enamind.net
ellnessdigitalmedia.store
mcreative.studio
wctoken-v2.icu
ochnonevpn.online
amewith.auction
groupsrl.net
piro.style
hdqyp.shop
76v.lat
dzywkanaporostrzes.pro
nitypath.website
slami.store
erseus-global.net
52pq293kt.skin
duxrib.xyz
utosub.xyz
otorcycle-loans-21363.bond
acho.store
lay44.bet
olka.xyz
eelthevibe.xyz
reezedrybreastmilk.net
ythicsportswear.online
tatspw.online
x-design-courses-91526.bond
inhngoc.photos
kuxepe.info
rjeffbarry.online
unnylogistics.pro
eaponreadiness.net
69nyccoffee.shop
atiao.asia
eekend-warriors.website
umematch.net
arrefour-banque.business
ehuatang.online
hhls370824.sbs
manate.ltd
oodstocks.sbs
essicafilho.online
nline-mba-94006.bond
hreekalyanam.online
nline-advertising-57293.bond
nline-advertising-77795.bond
otorcycle-loans-81246.bond
olar-battery-13607.bond
nfluencer-marketing-27273.bond
igitalsells-corner.xyz
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2988-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2988-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/312-21-0x0000000000750000-0x000000000077F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
FedEx Express AWB#5305323204643.exeFedEx Express AWB#5305323204643.exemsdt.exedescription pid Process procid_target PID 744 set thread context of 2988 744 FedEx Express AWB#5305323204643.exe 98 PID 2988 set thread context of 3432 2988 FedEx Express AWB#5305323204643.exe 56 PID 312 set thread context of 3432 312 msdt.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeFedEx Express AWB#5305323204643.exemsdt.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FedEx Express AWB#5305323204643.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
Processes:
FedEx Express AWB#5305323204643.exeFedEx Express AWB#5305323204643.exemsdt.exepid Process 744 FedEx Express AWB#5305323204643.exe 744 FedEx Express AWB#5305323204643.exe 2988 FedEx Express AWB#5305323204643.exe 2988 FedEx Express AWB#5305323204643.exe 2988 FedEx Express AWB#5305323204643.exe 2988 FedEx Express AWB#5305323204643.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe 312 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
FedEx Express AWB#5305323204643.exemsdt.exepid Process 2988 FedEx Express AWB#5305323204643.exe 2988 FedEx Express AWB#5305323204643.exe 2988 FedEx Express AWB#5305323204643.exe 312 msdt.exe 312 msdt.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
FedEx Express AWB#5305323204643.exeFedEx Express AWB#5305323204643.exemsdt.exedescription pid Process Token: SeDebugPrivilege 744 FedEx Express AWB#5305323204643.exe Token: SeDebugPrivilege 2988 FedEx Express AWB#5305323204643.exe Token: SeDebugPrivilege 312 msdt.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
FedEx Express AWB#5305323204643.exeExplorer.EXEmsdt.exedescription pid Process procid_target PID 744 wrote to memory of 2988 744 FedEx Express AWB#5305323204643.exe 98 PID 744 wrote to memory of 2988 744 FedEx Express AWB#5305323204643.exe 98 PID 744 wrote to memory of 2988 744 FedEx Express AWB#5305323204643.exe 98 PID 744 wrote to memory of 2988 744 FedEx Express AWB#5305323204643.exe 98 PID 744 wrote to memory of 2988 744 FedEx Express AWB#5305323204643.exe 98 PID 744 wrote to memory of 2988 744 FedEx Express AWB#5305323204643.exe 98 PID 3432 wrote to memory of 312 3432 Explorer.EXE 99 PID 3432 wrote to memory of 312 3432 Explorer.EXE 99 PID 3432 wrote to memory of 312 3432 Explorer.EXE 99 PID 312 wrote to memory of 876 312 msdt.exe 100 PID 312 wrote to memory of 876 312 msdt.exe 100 PID 312 wrote to memory of 876 312 msdt.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\FedEx Express AWB#5305323204643.exe"C:\Users\Admin\AppData\Local\Temp\FedEx Express AWB#5305323204643.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\FedEx Express AWB#5305323204643.exe"C:\Users\Admin\AppData\Local\Temp\FedEx Express AWB#5305323204643.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\FedEx Express AWB#5305323204643.exe"3⤵
- System Location Discovery: System Language Discovery
PID:876
-
-