Analysis
-
max time kernel
128s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2023, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
invoice DHL.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
invoice DHL.exe
Resource
win10v2004-20230703-en
General
-
Target
invoice DHL.exe
-
Size
652KB
-
MD5
ba9cb0937dcfd08ea824271db3694e85
-
SHA1
10e029c22b084fec23bf814645d6c5e6d8d005fd
-
SHA256
2572cbafc999216fe489d457721d60891da56a4936aa48a9ef822dac6ef83696
-
SHA512
a1b6ea2df19f7b939f89499b260634d5275caa38d65a190e7ba19f25d2a188921a52dc796d869dff46fc1f4a0057866695344984d965218b0a285f1d93709e2d
-
SSDEEP
12288:LL6o6o3UEXoWWIQZki5gOQSjqir5/ls6JK9e8YJNZQNa3NHmm7PHg:H9QIQZjsGBlk+eLg/g
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3468 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" invoice DHL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4368 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4168 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe 4424 invoice DHL.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4424 invoice DHL.exe Token: SeDebugPrivilege 3468 svchost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4424 wrote to memory of 3912 4424 invoice DHL.exe 89 PID 4424 wrote to memory of 3912 4424 invoice DHL.exe 89 PID 4424 wrote to memory of 4124 4424 invoice DHL.exe 91 PID 4424 wrote to memory of 4124 4424 invoice DHL.exe 91 PID 3912 wrote to memory of 4368 3912 cmd.exe 93 PID 3912 wrote to memory of 4368 3912 cmd.exe 93 PID 4124 wrote to memory of 4168 4124 cmd.exe 94 PID 4124 wrote to memory of 4168 4124 cmd.exe 94 PID 4124 wrote to memory of 3468 4124 cmd.exe 98 PID 4124 wrote to memory of 3468 4124 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\invoice DHL.exe"C:\Users\Admin\AppData\Local\Temp\invoice DHL.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:4368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA393.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:4168
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD592be2a5b33cc8c47623da863afaf29a0
SHA11718d284a6b9ce4faf74c1cfab32d653cc0d83fa
SHA256bc04a3492b1cbcb8cee9ad13fe518b39374660ed56abfd16bf353b08ce04b205
SHA512deae12a732dffc854a061fe00ce57ee5f3ad73c1060660b513bc719e0984603ea90365a6764d9c3ae4ec65c2ad0e4d63437a9157e311b5b468752ab2c2ce5d5f
-
Filesize
652KB
MD5ba9cb0937dcfd08ea824271db3694e85
SHA110e029c22b084fec23bf814645d6c5e6d8d005fd
SHA2562572cbafc999216fe489d457721d60891da56a4936aa48a9ef822dac6ef83696
SHA512a1b6ea2df19f7b939f89499b260634d5275caa38d65a190e7ba19f25d2a188921a52dc796d869dff46fc1f4a0057866695344984d965218b0a285f1d93709e2d
-
Filesize
652KB
MD5ba9cb0937dcfd08ea824271db3694e85
SHA110e029c22b084fec23bf814645d6c5e6d8d005fd
SHA2562572cbafc999216fe489d457721d60891da56a4936aa48a9ef822dac6ef83696
SHA512a1b6ea2df19f7b939f89499b260634d5275caa38d65a190e7ba19f25d2a188921a52dc796d869dff46fc1f4a0057866695344984d965218b0a285f1d93709e2d