Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
DHLTRACKING.exe
Resource
win7-20240508-en
General
-
Target
DHLTRACKING.exe
-
Size
1.4MB
-
MD5
1bf9ed5030bc34a0f0eaf72c26d521c8
-
SHA1
dd298f9d3437ea12fd3d89727ed0df05838477c2
-
SHA256
9d847f1168ee9ba615a9022c4f6665afc81f8f96366848c86c06964ba606c73f
-
SHA512
03ff5d9a28dc2128a795ed0e4f1d440c40b9209f7a0c6858d863700985cb63e0494feaab8eb23a05b657f0ee67c4560a341b3a9b2493800a1f47b91059956f0e
-
SSDEEP
24576:SAHnh+eWsN3skA4RV1Hom2KXSmdammEs9qU/Lt4odd4elyHeZfhlPV+gJ+sRIR/5:Vh+ZkldoPKi2ammEsr/Lt4odq2yEHsgG
Malware Config
Extracted
asyncrat
0.5.6A
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
46.183.223.29:6606
46.183.223.29:7707
46.183.223.29:8808
gqbslgbrfnuvpqsxnzw
-
delay
5
-
install
false
-
install_folder
%AppData%
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2632 cmd.exe -
Drops startup file 1 IoCs
Processes:
DHLTRACKING.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CloudStorageWizard.url DHLTRACKING.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DHLTRACKING.exedescription pid process target process PID 1668 set thread context of 324 1668 DHLTRACKING.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2668 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
MSBuild.exepid process 324 MSBuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
DHLTRACKING.exepid process 1668 DHLTRACKING.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 324 MSBuild.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
DHLTRACKING.exepid process 1668 DHLTRACKING.exe 1668 DHLTRACKING.exe 1668 DHLTRACKING.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
DHLTRACKING.exepid process 1668 DHLTRACKING.exe 1668 DHLTRACKING.exe 1668 DHLTRACKING.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
DHLTRACKING.execmd.exedescription pid process target process PID 1668 wrote to memory of 324 1668 DHLTRACKING.exe MSBuild.exe PID 1668 wrote to memory of 324 1668 DHLTRACKING.exe MSBuild.exe PID 1668 wrote to memory of 324 1668 DHLTRACKING.exe MSBuild.exe PID 1668 wrote to memory of 324 1668 DHLTRACKING.exe MSBuild.exe PID 1668 wrote to memory of 324 1668 DHLTRACKING.exe MSBuild.exe PID 1668 wrote to memory of 2632 1668 DHLTRACKING.exe cmd.exe PID 1668 wrote to memory of 2632 1668 DHLTRACKING.exe cmd.exe PID 1668 wrote to memory of 2632 1668 DHLTRACKING.exe cmd.exe PID 1668 wrote to memory of 2632 1668 DHLTRACKING.exe cmd.exe PID 2632 wrote to memory of 2668 2632 cmd.exe timeout.exe PID 2632 wrote to memory of 2668 2632 cmd.exe timeout.exe PID 2632 wrote to memory of 2668 2632 cmd.exe timeout.exe PID 2632 wrote to memory of 2668 2632 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHLTRACKING.exe"C:\Users\Admin\AppData\Local\Temp\DHLTRACKING.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\MSBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c TimeOut 1 & Del /F "C:\Users\Admin\AppData\Local\Temp\DHLTRACKING.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exeTimeOut 13⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/324-5-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/324-9-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/324-7-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/324-10-0x000000007486E000-0x000000007486F000-memory.dmpFilesize
4KB
-
memory/324-11-0x000000007486E000-0x000000007486F000-memory.dmpFilesize
4KB
-
memory/1668-3-0x0000000000390000-0x00000000003A8000-memory.dmpFilesize
96KB
-
memory/1668-4-0x00000000003F0000-0x0000000000408000-memory.dmpFilesize
96KB