Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 07:28
Behavioral task
behavioral1
Sample
DHL CORRECTION FORM.exe
Resource
win7-20240903-en
General
-
Target
DHL CORRECTION FORM.exe
-
Size
247KB
-
MD5
ba501476d5eed368c2975c5e9976ba41
-
SHA1
535282f5234f5c48a05bcec25026fa32c4a05617
-
SHA256
11c98c3bbf3f08f0d47153a819980189eacc20b3eaa44d2a88ec8a8aac17abda
-
SHA512
630edacc8ae82d10f54168d3ab018f961c6c6c15fb1f68a227d6c716e38ea341430984105aaccb96cd20bf7810f883b8cb6073c82f8ab648dcc1a58409d8efa3
-
SSDEEP
6144:69LI3rIbe7ixvQXf1G7Qtbfy1+D1NbWF6VomjoW3ziGQ:II76e7ixvuKQtbfy1GbWF6LjoWFQ
Malware Config
Extracted
formbook
4.1
ny03
utori.rest
eguropag.lat
urtownnc.net
andr.xyz
ciencesphysiques-igis-cg.tech
valita.fun
ipraya168.cyou
iege.net
uired.xyz
jha28.win
ividcleaningservicesla.online
exsentials.store
leaning-services-50948.bond
nternet-providers-69016.bond
nline-advertising-40574.bond
eidmueller.cloud
wise.xyz
lasticdrawersorganizer.shop
luegrass.construction
awn77play.homes
nfopointgestao.online
gray24back.online
biye.moda
yber-security-degree-93007.bond
eartcraft.xyz
arehouse-inventory-32904.bond
enoma.shop
uprra.xyz
aashirin-inter5.rest
xuh87ay22l3.cyou
pokfrtwpoekr.shop
arehouse-inventory-82289.bond
nline-advertising-76172.bond
jfoundation.shop
old789.lol
hegadgetvault.store
iddenheat.net
cpt.xyz
olaghakhan13.rest
ueijosminas.shop
rip15.casino
ntangroup.online
eloup.xyz
6xy.lat
azhouyizu33.buzz
ydadefence.xyz
oving-jobs-23907.bond
y-blouses-9n.today
erfumejunkie.shop
enelog.xyz
nlineincomeai.online
halc.info
qian.asia
avegadoresdomponline.buzz
iantic.xyz
888860.xyz
agamenslot.pro
viator19.live
onstruction-jobs-94016.bond
leaning-services-68315.bond
oodtech.fun
nfluencer-marketing-58245.bond
krm70.xyz
pyxfamilys.online
udrahotels.live
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/4376-2-0x0000000000570000-0x00000000005AF000-memory.dmp formbook behavioral2/memory/3096-7-0x0000000000330000-0x000000000035F000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4376 set thread context of 3520 4376 DHL CORRECTION FORM.exe 56 PID 3096 set thread context of 3520 3096 mstsc.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHL CORRECTION FORM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4376 DHL CORRECTION FORM.exe 4376 DHL CORRECTION FORM.exe 4376 DHL CORRECTION FORM.exe 4376 DHL CORRECTION FORM.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe 3096 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4376 DHL CORRECTION FORM.exe 4376 DHL CORRECTION FORM.exe 4376 DHL CORRECTION FORM.exe 3096 mstsc.exe 3096 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4376 DHL CORRECTION FORM.exe Token: SeDebugPrivilege 3096 mstsc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3520 wrote to memory of 3096 3520 Explorer.EXE 85 PID 3520 wrote to memory of 3096 3520 Explorer.EXE 85 PID 3520 wrote to memory of 3096 3520 Explorer.EXE 85 PID 3096 wrote to memory of 4604 3096 mstsc.exe 87 PID 3096 wrote to memory of 4604 3096 mstsc.exe 87 PID 3096 wrote to memory of 4604 3096 mstsc.exe 87
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\DHL CORRECTION FORM.exe"C:\Users\Admin\AppData\Local\Temp\DHL CORRECTION FORM.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL CORRECTION FORM.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4604
-
-