Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29-04-2024 09:47
Static task
static1
Behavioral task
behavioral1
Sample
DHL_M-002567436735845755676678877988975877.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
DHL_M-002567436735845755676678877988975877.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Forthteller/Fibrillationen52/Nonveracity/Kreolerne.ps1
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
Forthteller/Fibrillationen52/Nonveracity/Kreolerne.ps1
Resource
win10v2004-20240419-en
General
-
Target
DHL_M-002567436735845755676678877988975877.exe
-
Size
435KB
-
MD5
4e1e7a26a6c1115d55293a84f36575c1
-
SHA1
ec727b3bd73c11995e745ff1668ad69400f97d30
-
SHA256
cd533d45b704ab35ca35b9162805abb28710ca25399344812fa9f8598a93b30b
-
SHA512
e5f70560e440068c684d95992eace1fb649b0c091230db98f61ff68a49d3ff84530351d3b619445936cd51fc694c11fa43e77d0a1f400d165fcb2e13a670bc7e
-
SSDEEP
6144:lxFSmlmkDp54v/qwnQ6pNwhScW/rern/ZPYdnPBzYnBAqJ1tUWz:BtFFSa4ySperRPYvAAqJ19
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4308 powershell.exe 4628 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4308 set thread context of 4628 4308 powershell.exe 91 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\sammenryste.ini DHL_M-002567436735845755676678877988975877.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4308 powershell.exe 4308 powershell.exe 4308 powershell.exe 4308 powershell.exe 4308 powershell.exe 4308 powershell.exe 4308 powershell.exe 4308 powershell.exe 4308 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4308 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4308 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1748 wrote to memory of 4308 1748 DHL_M-002567436735845755676678877988975877.exe 84 PID 1748 wrote to memory of 4308 1748 DHL_M-002567436735845755676678877988975877.exe 84 PID 1748 wrote to memory of 4308 1748 DHL_M-002567436735845755676678877988975877.exe 84 PID 4308 wrote to memory of 468 4308 powershell.exe 89 PID 4308 wrote to memory of 468 4308 powershell.exe 89 PID 4308 wrote to memory of 468 4308 powershell.exe 89 PID 4308 wrote to memory of 4628 4308 powershell.exe 91 PID 4308 wrote to memory of 4628 4308 powershell.exe 91 PID 4308 wrote to memory of 4628 4308 powershell.exe 91 PID 4308 wrote to memory of 4628 4308 powershell.exe 91 PID 4308 wrote to memory of 4628 4308 powershell.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL_M-002567436735845755676678877988975877.exe"C:\Users\Admin\AppData\Local\Temp\DHL_M-002567436735845755676678877988975877.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Machi=Get-Content 'C:\Users\Admin\AppData\Local\Temp\Nit\plaskenes\Forthteller\Fibrillationen52\Nonveracity\Kreolerne.Ans';$Orichalceous=$Machi.SubString(58815,3);.$Orichalceous($Machi)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"3⤵PID:468
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Nit\plaskenes\Forthteller\Fibrillationen52\Nonveracity\Kreolerne.Ans
Filesize57KB
MD5cef01801545d5b91580cd6a4a9273144
SHA14ba951133e407bd0d6b0447d216528200aff68b9
SHA256f0f42ea894ea592f55fd42f05df638a1c0eb54f966671817ba67ac78d6da3345
SHA51257a39ee84f50065923d8441539da07a6ee49cc9e75e32d4f5b293c7d5a40b5f0cdf9b2e63fa29fbb279c86ad800ff4e8b72ed524d849e0ca423e61d3d9e0ebca
-
C:\Users\Admin\AppData\Local\Temp\Nit\plaskenes\Forthteller\Fibrillationen52\Nonveracity\Spndkrafts.Fla
Filesize344KB
MD5de7716e2bacc1169dfe5f7917ef0dbad
SHA1d3caf742f49f6dc4bd44c5bc0da1df56bb3926b0
SHA25699087333e7cd63b9ddb06469ec26b0fd17c324d046705c1cefb95705ac1a893a
SHA5129ce185d479cd1d0275481aa28c6980f72faf2a1286ae725cd908a086d71459d5f475319806a2ba850869f7738bf0b6a2ba228420518ede82295b7349f431137d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82