Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
DHL Receipt 004673321/DHL Receipt 004673321.pdf.exe
Resource
win7-20240221-en
General
-
Target
DHL Receipt 004673321/DHL Receipt 004673321.pdf.exe
-
Size
300.0MB
-
MD5
3f550e2404750bee9767c47ac42324ba
-
SHA1
7ce5b605f6ed25eca0243d9ac09a0b231cc9c3dc
-
SHA256
859d964cf907965c62903bddeb0667d570139bdb6b8fd0113d430b5f48cc7d52
-
SHA512
3e925a0036f71e4649da08e88ab80b816132f5d596189eaea04e95744ba2fa3180887f404a489b0e5dd4e32361e0e7dc29c272f391067094e4e0efa779c50058
-
SSDEEP
24576:xA2q55503nejbo6m7JkWao7AwnNxADGq/OCemti9vMY6TtyC:U5550sbyiWaw565tYct
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
DHL Receipt 004673321.pdf.exedescription pid process Token: SeDebugPrivilege 1692 DHL Receipt 004673321.pdf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
DHL Receipt 004673321.pdf.execsc.exedescription pid process target process PID 1692 wrote to memory of 1364 1692 DHL Receipt 004673321.pdf.exe csc.exe PID 1692 wrote to memory of 1364 1692 DHL Receipt 004673321.pdf.exe csc.exe PID 1692 wrote to memory of 1364 1692 DHL Receipt 004673321.pdf.exe csc.exe PID 1364 wrote to memory of 1956 1364 csc.exe cvtres.exe PID 1364 wrote to memory of 1956 1364 csc.exe cvtres.exe PID 1364 wrote to memory of 1956 1364 csc.exe cvtres.exe PID 1692 wrote to memory of 2548 1692 DHL Receipt 004673321.pdf.exe WerFault.exe PID 1692 wrote to memory of 2548 1692 DHL Receipt 004673321.pdf.exe WerFault.exe PID 1692 wrote to memory of 2548 1692 DHL Receipt 004673321.pdf.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL Receipt 004673321\DHL Receipt 004673321.pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Receipt 004673321\DHL Receipt 004673321.pdf.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\giqkqhbh\giqkqhbh.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFA27.tmp" "c:\Users\Admin\AppData\Local\Temp\giqkqhbh\CSC2F87330636B42848315B818ACA26732.TMP"3⤵PID:1956
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1692 -s 6082⤵PID:2548
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RESFA27.tmpFilesize
1KB
MD57bbbe7d1b809d42641bd8b37edb1cc30
SHA1a3fac695a50d03c3104b0b12bb91fe0e9583b4d5
SHA256782bb7384c7c1aa9aeddda868bc2e791fa8117c41372e7de615a6c48b373f797
SHA5124e4fd524d6aa085708c246b88b4e558736e8876c25d3a479984c80f9f378745b09da62b83513535eb0f621c5deb348fa93a98e28e0d63feb4173eb9eb15803c8
-
C:\Users\Admin\AppData\Local\Temp\giqkqhbh\giqkqhbh.dllFilesize
6KB
MD554c4db3bf6bf278bf56ff7d357380568
SHA187a1b8fd6cc069778e5634cd09f1b92be5034efc
SHA256f84fb23c3c19ec6f2b5a35d6abfa1c54e7bfc26d5a3d34785a979f212be76ada
SHA5122cb1c5dda630437a84241d7a2f15e2a870b10712b57279173466ebb74d06c473cb62c1523550392783aa9fea283cb9c1e14cc02ef42f72afa362166221f5317f
-
\??\c:\Users\Admin\AppData\Local\Temp\giqkqhbh\CSC2F87330636B42848315B818ACA26732.TMPFilesize
652B
MD5d56c35f898412076549ed8b37a26307a
SHA17005ea05bc052ef95a7684d572b65c54aa2ed447
SHA256604d56eea9ea813f9e5b29397dea2496be5983471803b8ff3221597c9b46b844
SHA5124bcab2b75abeb8bf726041b3aa8d63826703bafe4449a2868defd5b8a4c58870b74c3fb83a71c44195f5c936bc93c0732e8a3e008d5ed3ac011995a659d35b71
-
\??\c:\Users\Admin\AppData\Local\Temp\giqkqhbh\giqkqhbh.0.csFilesize
4KB
MD5d784666bd143ad91647f8e799749e071
SHA1706389c04825f2e12a24d00f67ea7140cdccf4ef
SHA2563bd5920de953fb49e0aec7994f20bcd50d304acf5a3f4f3b23d7408a6cb41ac6
SHA512c5a4c8817e19df8ad88aae8b9caa243235b23c31bf493704cddcb46e88df203b5fc5b03b535b06bade9816782828b7ba8c5fe247384c344677e570a15bcd07ac
-
\??\c:\Users\Admin\AppData\Local\Temp\giqkqhbh\giqkqhbh.cmdlineFilesize
366B
MD5f62533707717cd55c9c93e23a1c35da4
SHA12f40e7092e09ff5b5ea56055904d9937a86e9402
SHA256c137dd880311fac540c71fb7f8aa5e26c63e72aa269d77e95d6403ce5bf9cdcb
SHA5121725acd9f7d0c8618bafd22a3160c219e6611da7fc8fde9c51c8a292ce5d2097da4f1b66b8868c4a331a9494104f77ca50e4731a6ac06c8c73778af2d8556cda
-
memory/1692-0-0x0000000000300000-0x000000000038C000-memory.dmpFilesize
560KB
-
memory/1692-1-0x000007FEF5740000-0x000007FEF612C000-memory.dmpFilesize
9.9MB
-
memory/1692-2-0x000000001B190000-0x000000001B210000-memory.dmpFilesize
512KB
-
memory/1692-3-0x000007FEF5740000-0x000007FEF612C000-memory.dmpFilesize
9.9MB
-
memory/1692-16-0x00000000002D0000-0x00000000002D8000-memory.dmpFilesize
32KB