Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 18:32
Static task
static1
Behavioral task
behavioral1
Sample
DHL Package.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
DHL Package.exe
Resource
win10v2004-20240508-en
General
-
Target
DHL Package.exe
-
Size
623KB
-
MD5
057849d89c720ddae62b9006fd7587f9
-
SHA1
66c5732d79b3514e7e98ac01a25b3362f82b5eed
-
SHA256
dd838e0ad2d227d581a04b9968609c1cf78f8570bcc36fe7abf176ec36d2b5e5
-
SHA512
f169462b72e8cf5263b79a8796ab95c2a3d144022e7d34efb911bf5d4cb1c23cb319a060b8688214c183d4fc906cd42f61756b62bbd4e872acf153d104031b90
-
SSDEEP
12288:agStjpsZjq86yWpdlUefHglUw5L94SeH5rcDlcOJKhwF:WtdsZ1JAA4ZEcOwk
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Drops file in Program Files directory 2 IoCs
Processes:
DHL Package.exedescription ioc process File opened for modification C:\Program Files (x86)\Common Files\firbens\psycholeptic.ini DHL Package.exe File opened for modification C:\Program Files (x86)\Common Files\boltholes.obl DHL Package.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 868 2344 WerFault.exe powershell.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exepid process 2344 powershell.exe 2344 powershell.exe 2344 powershell.exe 2344 powershell.exe 2344 powershell.exe 2344 powershell.exe 2344 powershell.exe 2344 powershell.exe 2344 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2344 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
DHL Package.exepowershell.exedescription pid process target process PID 4440 wrote to memory of 2344 4440 DHL Package.exe powershell.exe PID 4440 wrote to memory of 2344 4440 DHL Package.exe powershell.exe PID 4440 wrote to memory of 2344 4440 DHL Package.exe powershell.exe PID 2344 wrote to memory of 992 2344 powershell.exe cmd.exe PID 2344 wrote to memory of 992 2344 powershell.exe cmd.exe PID 2344 wrote to memory of 992 2344 powershell.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL Package.exe"C:\Users\Admin\AppData\Local\Temp\DHL Package.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Uropfrer=Get-Content 'C:\Users\Admin\AppData\Local\Bridgebuilding\oralizes\indart\Mouthers\Afgiftsregler.del';$Skoleudgavers=$Uropfrer.SubString(54521,3);.$Skoleudgavers($Uropfrer)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"3⤵PID:992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 26083⤵
- Program crash
PID:868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2344 -ip 23441⤵PID:3656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5b1bf3757ba661c2fc29713ddaa598605
SHA15c77e7e505aa16a208499b1a67089bcdba3d349b
SHA256c8a6d8bb0a194f855387ef00c86f0016c1ba489eb7b6dc729af5853157d418c9
SHA51206a766ab5d297082781db399571d458202bdf155ad1415de5bc453753b640dfba5c9c47047e0aefd964bc6b31a7161e50723a67db4c93276bc35c01412c1d40a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82