Analysis

  • max time kernel
    92s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    18-08-2020 13:23

General

  • Target

    DHl Delivery reciept.exe

  • Size

    624KB

  • MD5

    2cfdae4ee4082225277048a7735c1561

  • SHA1

    da23e01a6e02dddfcd7a52b3822c28c5b16aafc2

  • SHA256

    8243c8a72e7a2021b4d956f5dafc19ded0162e9eb99f158f8da83660ea9368b5

  • SHA512

    764946c9a353ab7b4a71376efbfe143deaedfb753b6cf98489761b6fab442a79d07ef9b2e030f93f9bd9a3f7be7a65695e61f015da093dccfed8278be87df14a

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sapgroup.com.pk
  • Port:
    587
  • Username:
    moin.ansari@sapgroup.com.pk
  • Password:
    moin@26919

Signatures

  • 404 Keylogger

    Information stealer and keylogger first seen in 2019.

  • 404 Keylogger Main Executable 6 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DHl Delivery reciept.exe
    "C:\Users\Admin\AppData\Local\Temp\DHl Delivery reciept.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Users\Admin\AppData\Local\Temp\DHl Delivery reciept.exe
      "C:\Users\Admin\AppData\Local\Temp\DHl Delivery reciept.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1408

Network

  • flag-unknown
    DNS
    checkip.dyndns.org
    Remote address:
    8.8.8.8:53
    Request
    checkip.dyndns.org
    IN A
    Response
    checkip.dyndns.org
    IN CNAME
    checkip.dyndns.com
    checkip.dyndns.com
    IN A
    216.146.43.70
    checkip.dyndns.com
    IN A
    131.186.113.70
    checkip.dyndns.com
    IN A
    216.146.43.71
    checkip.dyndns.com
    IN A
    162.88.193.70
    checkip.dyndns.com
    IN A
    131.186.161.70
  • flag-unknown
    GET
    http://checkip.dyndns.org/
    DHl Delivery reciept.exe
    Remote address:
    216.146.43.70:80
    Request
    GET / HTTP/1.1
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
    Host: checkip.dyndns.org
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Content-Type: text/html
    Server: DynDNS-CheckIP/1.0.1
    Connection: close
    Cache-Control: no-cache
    Pragma: no-cache
    Content-Length: 104
  • flag-unknown
    DNS
    mail.sapgroup.com.pk
    Remote address:
    8.8.8.8:53
    Request
    mail.sapgroup.com.pk
    IN A
    Response
    mail.sapgroup.com.pk
    IN CNAME
    sapgroup.com.pk
    sapgroup.com.pk
    IN A
    95.215.225.23
  • flag-unknown
    DNS
    mail.sapgroup.com.pk
    Remote address:
    8.8.8.8:53
    Request
    mail.sapgroup.com.pk
    IN A
    Response
    mail.sapgroup.com.pk
    IN CNAME
    sapgroup.com.pk
    sapgroup.com.pk
    IN A
    95.215.225.23
  • flag-unknown
    DNS
    mail.sapgroup.com.pk
    Remote address:
    8.8.8.8:53
    Request
    mail.sapgroup.com.pk
    IN A
    Response
    mail.sapgroup.com.pk
    IN CNAME
    sapgroup.com.pk
    sapgroup.com.pk
    IN A
    95.215.225.23
  • flag-unknown
    DNS
    www.download.windowsupdate.com
    Remote address:
    8.8.8.8:53
    Request
    www.download.windowsupdate.com
    IN A
    Response
    www.download.windowsupdate.com
    IN CNAME
    wu-fg-shim.trafficmanager.net
    wu-fg-shim.trafficmanager.net
    IN CNAME
    2-01-3cf7-0009.cdx.cedexis.net
    2-01-3cf7-0009.cdx.cedexis.net
    IN CNAME
    wu.azureedge.net
    wu.azureedge.net
    IN CNAME
    wu.ec.azureedge.net
    wu.ec.azureedge.net
    IN CNAME
    wu.wpc.apr-52dd2.edgecastdns.net
    wu.wpc.apr-52dd2.edgecastdns.net
    IN CNAME
    hlb.apr-52dd2-0.edgecastdns.net
    hlb.apr-52dd2-0.edgecastdns.net
    IN CNAME
    cs11.wpc.v0cdn.net
    cs11.wpc.v0cdn.net
    IN A
    93.184.221.240
  • flag-unknown
    DNS
    DHl Delivery reciept.exe
    Remote address:
    93.184.221.240:80
    Response
    HTTP/1.1 200 OK
    Accept-Ranges: bytes
    Age: 601
    Cache-Control: public,max-age=3600
    Content-Type: application/vnd.ms-cab-compressed
    Date: Tue, 18 Aug 2020 13:23:29 GMT
    Etag: "0651c65d25ad61:0"
    Last-Modified: Wed, 15 Jul 2020 18:04:34 GMT
    Server: ECAcc (ama/8A9A)
    X-Cache: HIT
    X-CCC: NL
    X-CID: 11
    X-Powered-By: ASP.NET
    Content-Length: 58139
  • flag-unknown
    DNS
    DHl Delivery reciept.exe
    Remote address:
    93.184.221.240:80
    Response
    HTTP/1.1 304 Not Modified
    Accept-Ranges: bytes
    Age: 601
    Cache-Control: public,max-age=3600
    Date: Tue, 18 Aug 2020 13:23:29 GMT
    Etag: "0651c65d25ad61:0"
    Last-Modified: Wed, 15 Jul 2020 18:04:34 GMT
    Server: ECAcc (ama/8AC3)
    X-Cache: HIT
    X-CCC: NL
    X-CID: 11
    X-Powered-By: ASP.NET
  • 216.146.43.70:80
    http://checkip.dyndns.org/
    http
    DHl Delivery reciept.exe
    381 B
    465 B
    5
    5

    HTTP Request

    GET http://checkip.dyndns.org/

    HTTP Response

    200
  • 95.215.225.23:587
    mail.sapgroup.com.pk
    smtp-submission
    DHl Delivery reciept.exe
    3.8kB
    7.3kB
    29
    27
  • 93.184.221.240:80
    www.download.windowsupdate.com
    http
    DHl Delivery reciept.exe
    1.9kB
    60.9kB
    28
    46

    HTTP Response

    200

    HTTP Response

    304
  • 224.0.0.252:5355
    100 B
    2
  • 8.8.8.8:53
    checkip.dyndns.org
    dns
    64 B
    176 B
    1
    1

    DNS Request

    checkip.dyndns.org

    DNS Response

    216.146.43.70
    131.186.113.70
    216.146.43.71
    162.88.193.70
    131.186.161.70

  • 8.8.8.8:53
    mail.sapgroup.com.pk
    dns
    198 B
    288 B
    3
    3

    DNS Request

    mail.sapgroup.com.pk

    DNS Request

    mail.sapgroup.com.pk

    DNS Request

    mail.sapgroup.com.pk

    DNS Response

    95.215.225.23

    DNS Response

    95.215.225.23

    DNS Response

    95.215.225.23

  • 8.8.8.8:53
    www.download.windowsupdate.com
    dns
    76 B
    325 B
    1
    1

    DNS Request

    www.download.windowsupdate.com

    DNS Response

    93.184.221.240

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1408-0-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1408-2-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1408-3-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/1408-4-0x0000000000270000-0x0000000000292000-memory.dmp

    Filesize

    136KB

  • memory/1408-5-0x0000000000562000-0x0000000000563000-memory.dmp

    Filesize

    4KB

  • memory/1408-6-0x0000000000220000-0x000000000023C000-memory.dmp

    Filesize

    112KB

  • memory/1408-8-0x0000000073940000-0x000000007402E000-memory.dmp

    Filesize

    6.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.