Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    20/03/2023, 10:27

General

  • Target

    DHL Notification_pdf.exe

  • Size

    292KB

  • MD5

    06f7894017e8f6737d228adc14480c83

  • SHA1

    fab1cbdbbb5fc2e76de2622948a02c3e8af17c18

  • SHA256

    bbfb2aacf1ff431d0ed71b54c499d3a56b6bcc90d5137cd78097b40c354c2353

  • SHA512

    a88448b4853746bb49d2640e5f23796187e6234f744ee006c687e93197f9dee86cf826259b2480879dcf00dad0b98355dd49298ece63f0bc32f1d356b3f3d8d6

  • SSDEEP

    6144:PYa6brXt83aw4ZaNEQRd0SyjNmzvw/gAn/lfVuMqs6sV3jQl:PYRrXtCJ4Zazd0SyxEvwYA/l9l6s1je

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\DHL Notification_pdf.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1808
      • C:\Users\Admin\AppData\Local\Temp\ldndbi.exe
        "C:\Users\Admin\AppData\Local\Temp\ldndbi.exe" C:\Users\Admin\AppData\Local\Temp\qlqjt.de
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Users\Admin\AppData\Local\Temp\ldndbi.exe
          "C:\Users\Admin\AppData\Local\Temp\ldndbi.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1856
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1124
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:920

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\0pzpen.zip

            Filesize

            486KB

            MD5

            1e73cacce02ae20026a81f1e56416aa3

            SHA1

            f491a7301ce11cf11a92c0245c7e03d927422286

            SHA256

            0dd0dd38cde5a14e7d6d0830db62cc7037e521fd042b0b8da0763128b2c0b3f2

            SHA512

            afe77facd8b16cc744ac2277414ffaf83436999d15eb8ac707f8098e2f8ed4cb29b430392ebe46b7fa65b20730615bc33dee9416f7141da5032a630894980a0a

          • C:\Users\Admin\AppData\Local\Temp\ldndbi.exe

            Filesize

            93KB

            MD5

            c99b9b59b44f7789dd46e5230c22a9cd

            SHA1

            a4551975a1003a0309ae3eef35ff0183e388707b

            SHA256

            fc5d8e04a8c7a63b993963abb0a4ba5dd1203818cca5a04221a0e0470f2a3d1a

            SHA512

            de8ed5c68b001d32d71dfae1d9a30d1128848131f77a2fdd64b5e8c047d0e796b52335033f718bc89f0bfeed15517ae038468d227f4ed4a43e63cb51bd75f79e

          • C:\Users\Admin\AppData\Local\Temp\ldndbi.exe

            Filesize

            93KB

            MD5

            c99b9b59b44f7789dd46e5230c22a9cd

            SHA1

            a4551975a1003a0309ae3eef35ff0183e388707b

            SHA256

            fc5d8e04a8c7a63b993963abb0a4ba5dd1203818cca5a04221a0e0470f2a3d1a

            SHA512

            de8ed5c68b001d32d71dfae1d9a30d1128848131f77a2fdd64b5e8c047d0e796b52335033f718bc89f0bfeed15517ae038468d227f4ed4a43e63cb51bd75f79e

          • C:\Users\Admin\AppData\Local\Temp\ldndbi.exe

            Filesize

            93KB

            MD5

            c99b9b59b44f7789dd46e5230c22a9cd

            SHA1

            a4551975a1003a0309ae3eef35ff0183e388707b

            SHA256

            fc5d8e04a8c7a63b993963abb0a4ba5dd1203818cca5a04221a0e0470f2a3d1a

            SHA512

            de8ed5c68b001d32d71dfae1d9a30d1128848131f77a2fdd64b5e8c047d0e796b52335033f718bc89f0bfeed15517ae038468d227f4ed4a43e63cb51bd75f79e

          • C:\Users\Admin\AppData\Local\Temp\ldndbi.exe

            Filesize

            93KB

            MD5

            c99b9b59b44f7789dd46e5230c22a9cd

            SHA1

            a4551975a1003a0309ae3eef35ff0183e388707b

            SHA256

            fc5d8e04a8c7a63b993963abb0a4ba5dd1203818cca5a04221a0e0470f2a3d1a

            SHA512

            de8ed5c68b001d32d71dfae1d9a30d1128848131f77a2fdd64b5e8c047d0e796b52335033f718bc89f0bfeed15517ae038468d227f4ed4a43e63cb51bd75f79e

          • C:\Users\Admin\AppData\Local\Temp\qlqjt.de

            Filesize

            5KB

            MD5

            a994e285dd19803fb9ec4341608fa3bd

            SHA1

            d5d88c4a0c0dd00cf6120aac684492bc28203088

            SHA256

            95e31dd67caed4c3e24eaa150bbf40b380ae7dcb308639d45539675a66d827e4

            SHA512

            3beafb9225621703067b76099fca5a9d012f9cb9078f2fb32b6eb803ea2bce7e6d75598d5dada3d721f50ca67ffba3850bcb21a3aadab73414052f3a03b8e1c6

          • C:\Users\Admin\AppData\Local\Temp\tfnqr.hy

            Filesize

            205KB

            MD5

            1a4214b2d0c61b85eab942baa8b90a45

            SHA1

            48aeb34fbb99c2ac55961f17f84e1c3ee0740eaf

            SHA256

            b12b5eb17e8dc4dbc3a9fb16736bce60e097346e9236719508118510cc9092e1

            SHA512

            e1bd0fa394f3b555a43d62c294eea6385ae57a1254994fa34644dabfd6bb4208e16a032da00c8656fc1aedc9a57dd3fa72599b03ff098fc39ec085b4c90e445c

          • \Users\Admin\AppData\Local\Temp\ldndbi.exe

            Filesize

            93KB

            MD5

            c99b9b59b44f7789dd46e5230c22a9cd

            SHA1

            a4551975a1003a0309ae3eef35ff0183e388707b

            SHA256

            fc5d8e04a8c7a63b993963abb0a4ba5dd1203818cca5a04221a0e0470f2a3d1a

            SHA512

            de8ed5c68b001d32d71dfae1d9a30d1128848131f77a2fdd64b5e8c047d0e796b52335033f718bc89f0bfeed15517ae038468d227f4ed4a43e63cb51bd75f79e

          • \Users\Admin\AppData\Local\Temp\ldndbi.exe

            Filesize

            93KB

            MD5

            c99b9b59b44f7789dd46e5230c22a9cd

            SHA1

            a4551975a1003a0309ae3eef35ff0183e388707b

            SHA256

            fc5d8e04a8c7a63b993963abb0a4ba5dd1203818cca5a04221a0e0470f2a3d1a

            SHA512

            de8ed5c68b001d32d71dfae1d9a30d1128848131f77a2fdd64b5e8c047d0e796b52335033f718bc89f0bfeed15517ae038468d227f4ed4a43e63cb51bd75f79e

          • \Users\Admin\AppData\Local\Temp\ldndbi.exe

            Filesize

            93KB

            MD5

            c99b9b59b44f7789dd46e5230c22a9cd

            SHA1

            a4551975a1003a0309ae3eef35ff0183e388707b

            SHA256

            fc5d8e04a8c7a63b993963abb0a4ba5dd1203818cca5a04221a0e0470f2a3d1a

            SHA512

            de8ed5c68b001d32d71dfae1d9a30d1128848131f77a2fdd64b5e8c047d0e796b52335033f718bc89f0bfeed15517ae038468d227f4ed4a43e63cb51bd75f79e

          • \Users\Admin\AppData\Local\Temp\sqlite3.dll

            Filesize

            927KB

            MD5

            7fd80b1cc72dc580c02ca4cfbfb2592d

            SHA1

            18da905af878b27151b359cf1a7d0a650764e8a1

            SHA256

            1e6dccbdf8527abb53c289da920463b7895300d0d984cc7e91a3ecda4e673190

            SHA512

            13f7f29b5ed31c551aa5f27742557aa4d026a226087d6fcbca094819759ecc753a2c33b7422ae88dc6a4a0a966edb8485a18e59a0283ba2686cae5d78e0190a3

          • memory/1124-80-0x0000000000080000-0x00000000000AD000-memory.dmp

            Filesize

            180KB

          • memory/1124-84-0x0000000000550000-0x00000000005DF000-memory.dmp

            Filesize

            572KB

          • memory/1124-130-0x0000000061E00000-0x0000000061ED2000-memory.dmp

            Filesize

            840KB

          • memory/1124-126-0x0000000061E00000-0x0000000061ED2000-memory.dmp

            Filesize

            840KB

          • memory/1124-77-0x0000000000210000-0x0000000000217000-memory.dmp

            Filesize

            28KB

          • memory/1124-81-0x0000000002100000-0x0000000002403000-memory.dmp

            Filesize

            3.0MB

          • memory/1124-79-0x0000000000210000-0x0000000000217000-memory.dmp

            Filesize

            28KB

          • memory/1196-82-0x0000000004C00000-0x0000000004CD6000-memory.dmp

            Filesize

            856KB

          • memory/1196-86-0x0000000004C00000-0x0000000004CD6000-memory.dmp

            Filesize

            856KB

          • memory/1196-75-0x0000000004B20000-0x0000000004BF9000-memory.dmp

            Filesize

            868KB

          • memory/1856-72-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1856-76-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1856-73-0x0000000000820000-0x0000000000B23000-memory.dmp

            Filesize

            3.0MB

          • memory/1856-71-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1856-68-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1856-74-0x0000000000290000-0x00000000002A0000-memory.dmp

            Filesize

            64KB