Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
DHL_AWB#6078538091.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
DHL_AWB#6078538091.exe
Resource
win10v2004-20240226-en
General
-
Target
DHL_AWB#6078538091.exe
-
Size
1.2MB
-
MD5
1f474a80ef53faf305ef6e0c1f3c6eab
-
SHA1
9b6d4d236f6a6c71440ec81dc18d97ad6d8a8c9f
-
SHA256
ccc2d47913200e1b73cc2195fd00798181dc8ef052aae7ae6b6df00ae45e6ea7
-
SHA512
2e5b5d4d5abe683d1e1aa67cadf654da2287e2aafd0ad8d5dcd2e5991005e3439ccacfc412e7a5f22fe7d0b9286526301ece39fe7eb04b54fa79eba131e91a10
-
SSDEEP
24576:2qDEvCTbMWu7rQYlBQcBiT6rprG8adcAw3Mr7lVFTdxBB:2TvC/MTQYxsWR7ad7hlrd
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 840 set thread context of 492 840 DHL_AWB#6078538091.exe 90 PID 492 set thread context of 3464 492 svchost.exe 57 PID 492 set thread context of 4556 492 svchost.exe 100 PID 4556 set thread context of 3464 4556 dvdplay.exe 57 -
description ioc Process Key created \Registry\User\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 dvdplay.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 492 svchost.exe 492 svchost.exe 492 svchost.exe 492 svchost.exe 492 svchost.exe 492 svchost.exe 492 svchost.exe 492 svchost.exe 492 svchost.exe 492 svchost.exe 492 svchost.exe 492 svchost.exe 492 svchost.exe 492 svchost.exe 492 svchost.exe 492 svchost.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 840 DHL_AWB#6078538091.exe 492 svchost.exe 3464 Explorer.EXE 3464 Explorer.EXE 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe 4556 dvdplay.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 840 DHL_AWB#6078538091.exe 840 DHL_AWB#6078538091.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 840 DHL_AWB#6078538091.exe 840 DHL_AWB#6078538091.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3464 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 840 wrote to memory of 492 840 DHL_AWB#6078538091.exe 90 PID 840 wrote to memory of 492 840 DHL_AWB#6078538091.exe 90 PID 840 wrote to memory of 492 840 DHL_AWB#6078538091.exe 90 PID 840 wrote to memory of 492 840 DHL_AWB#6078538091.exe 90 PID 3464 wrote to memory of 4556 3464 Explorer.EXE 100 PID 3464 wrote to memory of 4556 3464 Explorer.EXE 100 PID 3464 wrote to memory of 4556 3464 Explorer.EXE 100 PID 4556 wrote to memory of 5112 4556 dvdplay.exe 101 PID 4556 wrote to memory of 5112 4556 dvdplay.exe 101 PID 4556 wrote to memory of 5112 4556 dvdplay.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\DHL_AWB#6078538091.exe"C:\Users\Admin\AppData\Local\Temp\DHL_AWB#6078538091.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\DHL_AWB#6078538091.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:492
-
-
-
C:\Windows\SysWOW64\dvdplay.exe"C:\Windows\SysWOW64\dvdplay.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:5112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5c487ed89f1f02a1e9bb5069d654d135e
SHA1bac4a49aa86bb0a7ff7a91bbc9b6e7c5fc5c640f
SHA256db4d116e4fcd6320f433f2452f044857c1a0038901ca5ed89df17ac38672fdf3
SHA512baf888c4688dc8a92f297c696e991456cab056565ace58de4ad95b82d13881d997a133c6285bb93a4fc4be4ed4f7477927a8717aeb7cf8927f76629684b8a7b3