Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/01/2023, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
BL-SHIPPING DOCUMENTS.exe
Resource
win7-20220901-en
General
-
Target
BL-SHIPPING DOCUMENTS.exe
-
Size
446KB
-
MD5
16adc1ddc372a6cb7d64700d26edcb72
-
SHA1
f6445a0a8f3b33f171d291cb5957fdd0201e4c9f
-
SHA256
81c0682751e0e809dc448f1bf8607a36c95840041de00cccd00032e066c6425e
-
SHA512
784ba69eaed316d0dda71594b8d7139763f7ec2307d9cd09fc1742fd9798bee285f906856603aa15ca035b34a6dca655cb28db31f85f909374d234bc7aba3036
-
SSDEEP
6144:AYa6RBgLagUpQmFiK40z85vc/AYO7go7dvb9b5:AYx26QVK40zVsgC/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2036 umqultcyhl.exe 1960 umqultcyhl.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\International\Geo\Nation umqultcyhl.exe -
Loads dropped DLL 4 IoCs
pid Process 848 BL-SHIPPING DOCUMENTS.exe 848 BL-SHIPPING DOCUMENTS.exe 2036 umqultcyhl.exe 1064 raserver.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2036 set thread context of 1960 2036 umqultcyhl.exe 28 PID 1960 set thread context of 1208 1960 umqultcyhl.exe 16 PID 1064 set thread context of 1208 1064 raserver.exe 16 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \Registry\User\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 raserver.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1960 umqultcyhl.exe 1960 umqultcyhl.exe 1960 umqultcyhl.exe 1960 umqultcyhl.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1208 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 2036 umqultcyhl.exe 1960 umqultcyhl.exe 1960 umqultcyhl.exe 1960 umqultcyhl.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe 1064 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1960 umqultcyhl.exe Token: SeDebugPrivilege 1064 raserver.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 848 wrote to memory of 2036 848 BL-SHIPPING DOCUMENTS.exe 27 PID 848 wrote to memory of 2036 848 BL-SHIPPING DOCUMENTS.exe 27 PID 848 wrote to memory of 2036 848 BL-SHIPPING DOCUMENTS.exe 27 PID 848 wrote to memory of 2036 848 BL-SHIPPING DOCUMENTS.exe 27 PID 2036 wrote to memory of 1960 2036 umqultcyhl.exe 28 PID 2036 wrote to memory of 1960 2036 umqultcyhl.exe 28 PID 2036 wrote to memory of 1960 2036 umqultcyhl.exe 28 PID 2036 wrote to memory of 1960 2036 umqultcyhl.exe 28 PID 2036 wrote to memory of 1960 2036 umqultcyhl.exe 28 PID 1208 wrote to memory of 1064 1208 Explorer.EXE 29 PID 1208 wrote to memory of 1064 1208 Explorer.EXE 29 PID 1208 wrote to memory of 1064 1208 Explorer.EXE 29 PID 1208 wrote to memory of 1064 1208 Explorer.EXE 29 PID 1064 wrote to memory of 764 1064 raserver.exe 32 PID 1064 wrote to memory of 764 1064 raserver.exe 32 PID 1064 wrote to memory of 764 1064 raserver.exe 32 PID 1064 wrote to memory of 764 1064 raserver.exe 32 PID 1064 wrote to memory of 764 1064 raserver.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\BL-SHIPPING DOCUMENTS.exe"C:\Users\Admin\AppData\Local\Temp\BL-SHIPPING DOCUMENTS.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\umqultcyhl.exe"C:\Users\Admin\AppData\Local\Temp\umqultcyhl.exe" C:\Users\Admin\AppData\Local\Temp\kidwodkojcm.l3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\umqultcyhl.exe"C:\Users\Admin\AppData\Local\Temp\umqultcyhl.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:764
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD54fca42202835f229e69279d2ab55537a
SHA198ae9454f82ac44ed4a548315d1ec723975b8a45
SHA2569c0e9ce4822439521dd3f99afc5076d8952352089c77a27de05c312bd6679ff4
SHA512dd64adecc32e0beb0d82a3e4a004576a06f6bc6f92b2e051c23a2fc36e3fe0af86a36ceaf3f87381ec41e022f17824a4b1f2a272647108b81eeacbf1be70ee2c
-
Filesize
84KB
MD5cca3fc4b553eea5e2f0c2338271b7bab
SHA127f2c2bd1ae7f5e0f0a6a4ab1755c402c966cfa9
SHA2567113a26bab066eb9cbecb9313606c81d190ee07caf2e59b3f829b78fc8f8601b
SHA5127ff8c84804ddaeda8ba0708e74a0ac72b3b693a61e14fa6e97e8ff42d972fc9b08ff7e988d86172702541dbd06b92d14c049eda3f2c29b8d698a5b8b585f9b8c
-
Filesize
84KB
MD5cca3fc4b553eea5e2f0c2338271b7bab
SHA127f2c2bd1ae7f5e0f0a6a4ab1755c402c966cfa9
SHA2567113a26bab066eb9cbecb9313606c81d190ee07caf2e59b3f829b78fc8f8601b
SHA5127ff8c84804ddaeda8ba0708e74a0ac72b3b693a61e14fa6e97e8ff42d972fc9b08ff7e988d86172702541dbd06b92d14c049eda3f2c29b8d698a5b8b585f9b8c
-
Filesize
84KB
MD5cca3fc4b553eea5e2f0c2338271b7bab
SHA127f2c2bd1ae7f5e0f0a6a4ab1755c402c966cfa9
SHA2567113a26bab066eb9cbecb9313606c81d190ee07caf2e59b3f829b78fc8f8601b
SHA5127ff8c84804ddaeda8ba0708e74a0ac72b3b693a61e14fa6e97e8ff42d972fc9b08ff7e988d86172702541dbd06b92d14c049eda3f2c29b8d698a5b8b585f9b8c
-
Filesize
205KB
MD5620057224da635600e31348434120a63
SHA1d15e12a6bc878e04fc09c67ec0e782f84383d1ad
SHA2564745b03e3108b54d3d8421a163ca64344578f7707d4f7f9fc3a9184ebd55aa0e
SHA51243e8a13ac4d2e7206ad713b745856587812848e9d4143677f4cc485eff9af5a6dbf9bce727872418dd5762646221bf7b3e969e34d81738e9c1fa8653216243f5
-
Filesize
831KB
MD5f4d8be409d1bd016a7b3b2580a2b90fb
SHA1a68e1f6a9b2234f2269d9cf1fbda94124c428dbe
SHA256d70b27121bb33012560b14a7bd597666d76193d7dc5f89e2ac5e7507240bf708
SHA5129892cd38d77898fe7916a8810c82a377bbcb4f0c3f75a8295943fa29a5cb4daec95a1600a74614f31ec723967fd95721174042f2e54b12e52fe85202cdf052df
-
Filesize
84KB
MD5cca3fc4b553eea5e2f0c2338271b7bab
SHA127f2c2bd1ae7f5e0f0a6a4ab1755c402c966cfa9
SHA2567113a26bab066eb9cbecb9313606c81d190ee07caf2e59b3f829b78fc8f8601b
SHA5127ff8c84804ddaeda8ba0708e74a0ac72b3b693a61e14fa6e97e8ff42d972fc9b08ff7e988d86172702541dbd06b92d14c049eda3f2c29b8d698a5b8b585f9b8c
-
Filesize
84KB
MD5cca3fc4b553eea5e2f0c2338271b7bab
SHA127f2c2bd1ae7f5e0f0a6a4ab1755c402c966cfa9
SHA2567113a26bab066eb9cbecb9313606c81d190ee07caf2e59b3f829b78fc8f8601b
SHA5127ff8c84804ddaeda8ba0708e74a0ac72b3b693a61e14fa6e97e8ff42d972fc9b08ff7e988d86172702541dbd06b92d14c049eda3f2c29b8d698a5b8b585f9b8c
-
Filesize
84KB
MD5cca3fc4b553eea5e2f0c2338271b7bab
SHA127f2c2bd1ae7f5e0f0a6a4ab1755c402c966cfa9
SHA2567113a26bab066eb9cbecb9313606c81d190ee07caf2e59b3f829b78fc8f8601b
SHA5127ff8c84804ddaeda8ba0708e74a0ac72b3b693a61e14fa6e97e8ff42d972fc9b08ff7e988d86172702541dbd06b92d14c049eda3f2c29b8d698a5b8b585f9b8c