Analysis

  • max time kernel
    152s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    31-05-2022 00:00

General

  • Target

    DHL BILL OF LADING 62803217763.exe

  • Size

    736KB

  • MD5

    5577d22b593e5d028b779dd76891acf2

  • SHA1

    c6ab92abb2f50e484aa672f71f5d04093a21cc2b

  • SHA256

    64c4c850be4f8e9a0e12eeeb015c503dd5a2d0f22b8d872678227729bb6db757

  • SHA512

    3376f5c418b824343624ef1a38337f63ad49d03f71330a8419a60befdc5c355a5e8e2e862967ef846b8270832f0c6b9504b6620ea985d102ad7ecee83de84834

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DHL BILL OF LADING 62803217763.exe
    "C:\Users\Admin\AppData\Local\Temp\DHL BILL OF LADING 62803217763.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:5004

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5004-130-0x00000000009A0000-0x0000000000A5E000-memory.dmp
    Filesize

    760KB

  • memory/5004-131-0x00000000059F0000-0x0000000005F94000-memory.dmp
    Filesize

    5.6MB

  • memory/5004-132-0x0000000005440000-0x00000000054D2000-memory.dmp
    Filesize

    584KB

  • memory/5004-133-0x0000000005410000-0x000000000541A000-memory.dmp
    Filesize

    40KB

  • memory/5004-134-0x0000000005940000-0x00000000059DC000-memory.dmp
    Filesize

    624KB

  • memory/5004-135-0x00000000060D0000-0x0000000006136000-memory.dmp
    Filesize

    408KB