Analysis
-
max time kernel
148s -
max time network
38s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
31-07-2020 10:05
Static task
static1
Behavioral task
behavioral1
Sample
AWB & Invoice -TNT Shipment.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
AWB & Invoice -TNT Shipment.exe
Resource
win10
General
-
Target
AWB & Invoice -TNT Shipment.exe
-
Size
772KB
-
MD5
e4a5d743052e9e0c567269b98edda3b9
-
SHA1
cebdbcdcac76701fa99761930e8c80c21d03059e
-
SHA256
d68a3fdd922868d3886be6c90f18cf232a0051b68f8232f67743e5b8df0ee914
-
SHA512
5eb13cf59fd28235f23c0ccef7ce33db109daaadc9d7f6c3f81ba3891f7fe48193bf5119f11db1e637492eaf5567b67fcb4d87600981828024c30c2e75eaba35
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AWB & Invoice -TNT Shipment.exedescription pid process Token: SeDebugPrivilege 1332 AWB & Invoice -TNT Shipment.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
AWB & Invoice -TNT Shipment.exepid process 1332 AWB & Invoice -TNT Shipment.exe 1332 AWB & Invoice -TNT Shipment.exe 1332 AWB & Invoice -TNT Shipment.exe 1332 AWB & Invoice -TNT Shipment.exe 1332 AWB & Invoice -TNT Shipment.exe 1332 AWB & Invoice -TNT Shipment.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1332-1-0x0000000000000000-0x0000000000000000-disk.dmp