Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/09/2022, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
DHL SHIPMENT.exe
Resource
win7-20220812-en
General
-
Target
DHL SHIPMENT.exe
-
Size
274KB
-
MD5
904526ba0b032ab844c0b258a9b038a1
-
SHA1
2c5ae47c87cf9111300fc0063f8054a5e33e8cab
-
SHA256
ba51afdb597f570e1914c3253b219b6397f9df8f6448a33991dafe561706f2db
-
SHA512
ec393d0efe237a274570dd986d162748fd8d6dc5183a2745a6dd8870b21f000fa495742937e19f05ea6220c27adaa21f7a1ecafa7bd20f070a54334d8cb14520
-
SSDEEP
6144:nKsjATsXadzG3nGFqPwlwV/ERgSi1AbQ6Qi33IBzz6jG:KsjATsXaw3WywO2gSgANQioBzz6K
Malware Config
Extracted
formbook
fqsu
GhfTqaOqC4FsyoQRW/8=
kbPIpd/8k1C6zJz5mYYdK90ZUA==
VIdg/CoNGeYJHA==
KhzoqndOhw1j43z0ew==
wv8mTDcsX2wJN/Q=
MqBgt6S+3BgGKBQHLZy7Ucg=
GyhOb++nZDi39NPK7dbaKapf
pBtD1UoSTdo3eSp9H7OhRqMV0TAuKMU=
WTzTg1w+fP4fMO0oPPM=
NS/tpGdUwkiMwqmgkxoSzjrQATAuKMU=
MnoSdM1hYn4tdwxjB2fX
3EUfH2EJY17mMf4=
V9/wg2yCQruVszm7V+4=
aNL8pZCGYW4Ej2LD
1Bif9VkmdgVfrJqRvl1GtlTZq1M=
9wHIgmB8EOB2uUVcUfk=
1Fdn15qem+fL1qhrY9xdQmAnVg==
Y32ThttYUUr6PsuRmozlNP74RD+uBz7dOQ==
f5HKyoWNAJLM2qjnZlizsvXDKFs=
mRfaGezap6ZyvJqthZvf
XE1gb9BDOSjo
a9OJ2b2kjstszoza
9btSLokhpHEBONENG+A=
1oAKNwX+AlQ4RiqbCKr3/A==
CXyeL6Bef+sHEOohAWbW
LIB9lHUdfinrMPw=
X7dIczoX7/WDk2a0P4P42iAqXA==
1AosTUdOqyZn43z0ew==
w4kh92EUqSnrMPw=
X9mR59TIpqmQ3MRW3dHaKapf
KW8vtcGOicqbG6P1y0bE5w==
vkxt6aqmRoxJWDaaKoHs+c7R2RWuug==
djf3H/3eGlnoHf4=
QcvffHSEZVsaWTg6K5y7Ucg=
/kfWf0w9mxRGn1uybA==
b8lWfUMY2+E9opoOvdTaKapf
4ifWgGxC54S499ZNmE/F5Q==
7AP9JgUOCEUfL/5LmE/F5Q==
42soE+T1jmG3vkVcUfk=
2AssSCkCPo5ji3athZvf
sNMB+T7ij5hvrZLJiX7V
HR01IYJZMBiUzai563i+Z9E=
4Fd9D4pjthkFCt5RmE/F5Q==
6yu5FXMXHiy7zqGthZvf
cO+UduB23nibvKmTiwbzQmAnVg==
vXETR/2rOfRETvrbmE/F5Q==
ic+XHc6whH7sfccPmE/F5Q==
DSc+LHk1A/5szoza
JTFNQgUfvHjj4Kb8os3aKapf
YxDG7ce0Ers3TB1s39HaKapf
j+eurPutWiCeDmathZvf
XQcvovGUtwkHTB519CFlQmAnVg==
1HmuRaRp15cZQQbZ7hFlQmAnVg==
tPmYAWoWGUY6SPhMmE/F5Q==
EFryTMuzz5HJ9OU=
G135x5VKYpuQ43z0ew==
CTnVhWd74nOZ43z0ew==
sJ+03smn9npsyoQRW/8=
JJRan1oWtqJ2vJiNVpWT9KBZ
Qj9Pa11v7KkTUSfp46OeQcZK/W0PZLdr
FjVWTQ8bqinrMPw=
rdVfEergTeAkTAXemE/F5Q==
55jA4cQafSnrMPw=
kIcp2ZZgh9jlEgn7D6KNKHID70AOvlxj
mtvglobalmusic.com
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1032 set thread context of 2824 1032 DHL SHIPMENT.exe 81 PID 2824 set thread context of 2152 2824 cvtres.exe 54 PID 4736 set thread context of 2152 4736 rundll32.exe 54 -
description ioc Process Key created \Registry\User\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1032 DHL SHIPMENT.exe 1032 DHL SHIPMENT.exe 2824 cvtres.exe 2824 cvtres.exe 2824 cvtres.exe 2824 cvtres.exe 2824 cvtres.exe 2824 cvtres.exe 2824 cvtres.exe 2824 cvtres.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2152 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2824 cvtres.exe 2824 cvtres.exe 2824 cvtres.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe 4736 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1032 DHL SHIPMENT.exe Token: SeDebugPrivilege 2824 cvtres.exe Token: SeDebugPrivilege 4736 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1032 wrote to memory of 3912 1032 DHL SHIPMENT.exe 80 PID 1032 wrote to memory of 3912 1032 DHL SHIPMENT.exe 80 PID 1032 wrote to memory of 3912 1032 DHL SHIPMENT.exe 80 PID 1032 wrote to memory of 2824 1032 DHL SHIPMENT.exe 81 PID 1032 wrote to memory of 2824 1032 DHL SHIPMENT.exe 81 PID 1032 wrote to memory of 2824 1032 DHL SHIPMENT.exe 81 PID 1032 wrote to memory of 2824 1032 DHL SHIPMENT.exe 81 PID 1032 wrote to memory of 2824 1032 DHL SHIPMENT.exe 81 PID 1032 wrote to memory of 2824 1032 DHL SHIPMENT.exe 81 PID 2152 wrote to memory of 4736 2152 Explorer.EXE 82 PID 2152 wrote to memory of 4736 2152 Explorer.EXE 82 PID 2152 wrote to memory of 4736 2152 Explorer.EXE 82 PID 4736 wrote to memory of 3216 4736 rundll32.exe 90 PID 4736 wrote to memory of 3216 4736 rundll32.exe 90 PID 4736 wrote to memory of 3216 4736 rundll32.exe 90
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\DHL SHIPMENT.exe"C:\Users\Admin\AppData\Local\Temp\DHL SHIPMENT.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵PID:3912
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3216
-
-