Overview
overview
10Static
static
3SHIPPING D...TS.exe
windows7-x64
10SHIPPING D...TS.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3NBProjects...in.exe
windows7-x64
7NBProjects...in.exe
windows10-2004-x64
7Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 17:36
Static task
static1
Behavioral task
behavioral1
Sample
SHIPPING DOCUMENTS.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
SHIPPING DOCUMENTS.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
NBProjects/ParticleFirmware/nbproject/private/uninstall-particle-toolchain.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
NBProjects/ParticleFirmware/nbproject/private/uninstall-particle-toolchain.exe
Resource
win10v2004-20241007-en
General
-
Target
SHIPPING DOCUMENTS.exe
-
Size
286KB
-
MD5
3bfed708b8b2bb2218e5aaea51af6c87
-
SHA1
89f8ddd855e13bbfadd3bc0fabba8f92242eb6b7
-
SHA256
c05bf234f0a814069b3cd844d38944e8e704bff80981657d549041b84c905da0
-
SHA512
bdc3657efb44736c96857c3a63d53b9ed4bd71c4c022fbd87f18f59aa46fda87f8ff0e4be735efbee7e06dc2e1dd2010996e51d0c06a7bcbf09c40e0960da46e
-
SSDEEP
6144:6Qqes0a6E1950u0f96+A9VIbpY26NIctdRPvB:816sPlZkpAIctfPvB
Malware Config
Extracted
formbook
4.1
ngvm
justiceforashleymoore.com
tyqbfe.com
zydonghua.com
crossfootwear.com
mysticlight-shop.com
digitaldefenseacademy.com
joyfulgoodies.com
blog-kotori-haru.com
atelierlinneakunstoghelse.com
destinyonlineacademy.com
series.onl
bellizzo.com
totalscalpsolutions.com
musicrowstudiorecording.com
digitalgamerentals.com
princecreativehk.com
bitchesofzion.com
imodalmarine.com
chilly-sauce.com
studionikolla.com
jilluonlinemart.com
ypoinc.com
chothuenhaxuongtphcm.com
gadamagado.com
cartscroll.com
congying1688.com
fesdimac.com
xn--rhqu70hdoa298e.com
zkdxin168.com
the-plague-doctor.com
speakeroo.online
urban-xr.com
kanjani8-house.com
alberaber.com
eamm-eg.com
alsawtisrael.com
deathvalleysolar.com
vuyo.club
zcoatux.icu
marksfly.com
advertisershopper.com
hashratelab.com
broadesys.com
sampoelstra.com
poacolors.com
sciencelogicandfaith.com
bootupcertificatemount.xyz
alotranscend.com
steadwaybytriarc.com
simplefinest.com
adinaroseyoga.com
btb659.com
ecftech.com
caravansforsalenorthwales.com
e1536.com
sellmyhouseolympia.com
vacalinda.com
truegemsproperty.com
aeternusprofero.com
djspencer.com
zhubviz.online
xn--r2bnc0b.com
luisxe.info
servicesbackyard.com
moneyhuntercom.info
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/972-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/972-15-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/972-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2816-26-0x0000000000080000-0x00000000000AE000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2896 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2000 SHIPPING DOCUMENTS.exe 2000 SHIPPING DOCUMENTS.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2000 set thread context of 972 2000 SHIPPING DOCUMENTS.exe 31 PID 972 set thread context of 1192 972 SHIPPING DOCUMENTS.exe 21 PID 972 set thread context of 1192 972 SHIPPING DOCUMENTS.exe 21 PID 2816 set thread context of 1192 2816 help.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SHIPPING DOCUMENTS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2000 SHIPPING DOCUMENTS.exe 972 SHIPPING DOCUMENTS.exe 2896 cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 972 SHIPPING DOCUMENTS.exe 972 SHIPPING DOCUMENTS.exe 972 SHIPPING DOCUMENTS.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe 2816 help.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2000 SHIPPING DOCUMENTS.exe 972 SHIPPING DOCUMENTS.exe 972 SHIPPING DOCUMENTS.exe 972 SHIPPING DOCUMENTS.exe 972 SHIPPING DOCUMENTS.exe 2816 help.exe 2816 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 972 SHIPPING DOCUMENTS.exe Token: SeDebugPrivilege 2816 help.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2000 wrote to memory of 972 2000 SHIPPING DOCUMENTS.exe 31 PID 2000 wrote to memory of 972 2000 SHIPPING DOCUMENTS.exe 31 PID 2000 wrote to memory of 972 2000 SHIPPING DOCUMENTS.exe 31 PID 2000 wrote to memory of 972 2000 SHIPPING DOCUMENTS.exe 31 PID 2000 wrote to memory of 972 2000 SHIPPING DOCUMENTS.exe 31 PID 1192 wrote to memory of 2816 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2816 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2816 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2816 1192 Explorer.EXE 32 PID 2816 wrote to memory of 2896 2816 help.exe 33 PID 2816 wrote to memory of 2896 2816 help.exe 33 PID 2816 wrote to memory of 2896 2816 help.exe 33 PID 2816 wrote to memory of 2896 2816 help.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS.exe"3⤵
- Suspicious use of SetThreadContext
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENTS.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f