Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
DHL Package.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
DHL Package.exe
Resource
win10v2004-20240426-en
General
-
Target
DHL Package.exe
-
Size
623KB
-
MD5
057849d89c720ddae62b9006fd7587f9
-
SHA1
66c5732d79b3514e7e98ac01a25b3362f82b5eed
-
SHA256
dd838e0ad2d227d581a04b9968609c1cf78f8570bcc36fe7abf176ec36d2b5e5
-
SHA512
f169462b72e8cf5263b79a8796ab95c2a3d144022e7d34efb911bf5d4cb1c23cb319a060b8688214c183d4fc906cd42f61756b62bbd4e872acf153d104031b90
-
SSDEEP
12288:agStjpsZjq86yWpdlUefHglUw5L94SeH5rcDlcOJKhwF:WtdsZ1JAA4ZEcOwk
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2188 powershell.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\firbens\psycholeptic.ini DHL Package.exe File opened for modification C:\Program Files (x86)\Common Files\boltholes.obl DHL Package.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2432 2188 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2188 powershell.exe 2188 powershell.exe 2188 powershell.exe 2188 powershell.exe 2188 powershell.exe 2188 powershell.exe 2188 powershell.exe 2188 powershell.exe 2188 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2188 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2188 2500 DHL Package.exe 81 PID 2500 wrote to memory of 2188 2500 DHL Package.exe 81 PID 2500 wrote to memory of 2188 2500 DHL Package.exe 81 PID 2188 wrote to memory of 2120 2188 powershell.exe 87 PID 2188 wrote to memory of 2120 2188 powershell.exe 87 PID 2188 wrote to memory of 2120 2188 powershell.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL Package.exe"C:\Users\Admin\AppData\Local\Temp\DHL Package.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Uropfrer=Get-Content 'C:\Users\Admin\AppData\Local\Bridgebuilding\oralizes\indart\Mouthers\Afgiftsregler.del';$Skoleudgavers=$Uropfrer.SubString(54521,3);.$Skoleudgavers($Uropfrer)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"3⤵PID:2120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 25563⤵
- Program crash
PID:2432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2188 -ip 21881⤵PID:1708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5b1bf3757ba661c2fc29713ddaa598605
SHA15c77e7e505aa16a208499b1a67089bcdba3d349b
SHA256c8a6d8bb0a194f855387ef00c86f0016c1ba489eb7b6dc729af5853157d418c9
SHA51206a766ab5d297082781db399571d458202bdf155ad1415de5bc453753b640dfba5c9c47047e0aefd964bc6b31a7161e50723a67db4c93276bc35c01412c1d40a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82