Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 14:17

General

  • Target

    dhl_awb_shipping_invoice_21_05_2024_000000000000024.exe

  • Size

    652KB

  • MD5

    3783014e89435e8f979155435933d4f0

  • SHA1

    c711fb0d97d5d363e241ed5532c6331e0fe8aa57

  • SHA256

    a7a04842ca3e817e5ae28cf389f590ba2a4f76c63e25249419bad63277b7312f

  • SHA512

    611452baa7692ffd4a5f3fb73d60a0e1b4ecc8a77d1d94021c87e369909c8d9d583c5e2ae575fd7ebb95b5a3e70fb670fa4d97a4594644b74d1bb1adc9c75010

  • SSDEEP

    12288:NgeDYSnG4nSUWbjU0WHUMTJRewXLvWkgTkVj:tDYSnG4n2bjmHUMhvKI

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 2 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dhl_awb_shipping_invoice_21_05_2024_000000000000024.exe
    "C:\Users\Admin\AppData\Local\Temp\dhl_awb_shipping_invoice_21_05_2024_000000000000024.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\dhl_awb_shipping_invoice_21_05_2024_000000000000024.exe
      "C:\Users\Admin\AppData\Local\Temp\dhl_awb_shipping_invoice_21_05_2024_000000000000024.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1560
      • C:\Users\Admin\AppData\Local\Temp\dhl_awb_shipping_invoice_21_05_2024_000000000000024.exe
        C:\Users\Admin\AppData\Local\Temp\dhl_awb_shipping_invoice_21_05_2024_000000000000024.exe /stext "C:\Users\Admin\AppData\Local\Temp\xhckfpnjcmqcgwkdrbfsuvctzwzcqqxnyq"
        3⤵
          PID:2068
        • C:\Users\Admin\AppData\Local\Temp\dhl_awb_shipping_invoice_21_05_2024_000000000000024.exe
          C:\Users\Admin\AppData\Local\Temp\dhl_awb_shipping_invoice_21_05_2024_000000000000024.exe /stext "C:\Users\Admin\AppData\Local\Temp\ibhvgi"
          3⤵
          • Accesses Microsoft Outlook accounts
          PID:1612
        • C:\Users\Admin\AppData\Local\Temp\dhl_awb_shipping_invoice_21_05_2024_000000000000024.exe
          C:\Users\Admin\AppData\Local\Temp\dhl_awb_shipping_invoice_21_05_2024_000000000000024.exe /stext "C:\Users\Admin\AppData\Local\Temp\sdvohsjfmc"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2208

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Pictures\belejrernes.lnk

      Filesize

      1KB

      MD5

      b7587f5155c372c444f16a4440646869

      SHA1

      17e3b2a17cf705a5446d5a64661adcd53d3849f8

      SHA256

      d34f554d253fc59e51ce24fe37ff1b71588a299f720ad67312e5701eb270c6f2

      SHA512

      9c13e79fe47e21c9405877ccc85c5e91843e26ec5afa4b2dc43b1a1c18a66875b224b3586dec182e3587ffdefd297a620aaf2720f26818ace95d620a987f62ca

    • \Users\Admin\AppData\Local\Temp\nso1892.tmp\System.dll

      Filesize

      11KB

      MD5

      fc3772787eb239ef4d0399680dcc4343

      SHA1

      db2fa99ec967178cd8057a14a428a8439a961a73

      SHA256

      9b93c61c9d63ef8ec80892cc0e4a0877966dca9b0c3eb85555cebd2ddf4d6eed

      SHA512

      79e491ca4591a5da70116114b7fbb66ee15a0532386035e980c9dfe7afb59b1f9d9c758891e25bfb45c36b07afd3e171bac37a86c887387ef0e80b1eaf296c89

    • memory/1560-328-0x0000000036C10000-0x0000000036C29000-memory.dmp

      Filesize

      100KB

    • memory/1560-327-0x0000000036C10000-0x0000000036C29000-memory.dmp

      Filesize

      100KB

    • memory/1560-293-0x0000000077900000-0x0000000077AA9000-memory.dmp

      Filesize

      1.7MB

    • memory/1560-295-0x00000000004B0000-0x0000000001512000-memory.dmp

      Filesize

      16.4MB

    • memory/1560-296-0x0000000001520000-0x0000000006D7F000-memory.dmp

      Filesize

      88.4MB

    • memory/1560-324-0x0000000036C10000-0x0000000036C29000-memory.dmp

      Filesize

      100KB

    • memory/1612-304-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1612-306-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1612-302-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1612-323-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/1612-303-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/2068-314-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2068-305-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2068-301-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2208-307-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2208-308-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2208-309-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2208-313-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2208-310-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2228-292-0x0000000077900000-0x0000000077AA9000-memory.dmp

      Filesize

      1.7MB

    • memory/2228-291-0x0000000077901000-0x0000000077A02000-memory.dmp

      Filesize

      1.0MB