Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
DHLTRACKING.exe
Resource
win7-20240508-en
General
-
Target
DHLTRACKING.exe
-
Size
1.4MB
-
MD5
1bf9ed5030bc34a0f0eaf72c26d521c8
-
SHA1
dd298f9d3437ea12fd3d89727ed0df05838477c2
-
SHA256
9d847f1168ee9ba615a9022c4f6665afc81f8f96366848c86c06964ba606c73f
-
SHA512
03ff5d9a28dc2128a795ed0e4f1d440c40b9209f7a0c6858d863700985cb63e0494feaab8eb23a05b657f0ee67c4560a341b3a9b2493800a1f47b91059956f0e
-
SSDEEP
24576:SAHnh+eWsN3skA4RV1Hom2KXSmdammEs9qU/Lt4odd4elyHeZfhlPV+gJ+sRIR/5:Vh+ZkldoPKi2ammEsr/Lt4odq2yEHsgG
Malware Config
Extracted
asyncrat
0.5.6A
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
46.183.223.29:6606
46.183.223.29:7707
46.183.223.29:8808
gqbslgbrfnuvpqsxnzw
-
delay
5
-
install
false
-
install_folder
%AppData%
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
DHLTRACKING.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation DHLTRACKING.exe -
Drops startup file 1 IoCs
Processes:
DHLTRACKING.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CloudStorageWizard.url DHLTRACKING.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DHLTRACKING.exedescription pid process target process PID 4000 set thread context of 2112 4000 DHLTRACKING.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1388 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
MSBuild.exepid process 2112 MSBuild.exe 2112 MSBuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
DHLTRACKING.exepid process 4000 DHLTRACKING.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 2112 MSBuild.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
DHLTRACKING.exepid process 4000 DHLTRACKING.exe 4000 DHLTRACKING.exe 4000 DHLTRACKING.exe 4000 DHLTRACKING.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
DHLTRACKING.exepid process 4000 DHLTRACKING.exe 4000 DHLTRACKING.exe 4000 DHLTRACKING.exe 4000 DHLTRACKING.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
DHLTRACKING.execmd.exedescription pid process target process PID 4000 wrote to memory of 2112 4000 DHLTRACKING.exe MSBuild.exe PID 4000 wrote to memory of 2112 4000 DHLTRACKING.exe MSBuild.exe PID 4000 wrote to memory of 2112 4000 DHLTRACKING.exe MSBuild.exe PID 4000 wrote to memory of 2112 4000 DHLTRACKING.exe MSBuild.exe PID 4000 wrote to memory of 2280 4000 DHLTRACKING.exe cmd.exe PID 4000 wrote to memory of 2280 4000 DHLTRACKING.exe cmd.exe PID 4000 wrote to memory of 2280 4000 DHLTRACKING.exe cmd.exe PID 2280 wrote to memory of 1388 2280 cmd.exe timeout.exe PID 2280 wrote to memory of 1388 2280 cmd.exe timeout.exe PID 2280 wrote to memory of 1388 2280 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHLTRACKING.exe"C:\Users\Admin\AppData\Local\Temp\DHLTRACKING.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\MSBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c TimeOut 1 & Del /F "C:\Users\Admin\AppData\Local\Temp\DHLTRACKING.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exeTimeOut 13⤵
- Delays execution with timeout.exe
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4120 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2112-5-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2112-6-0x0000000073EAE000-0x0000000073EAF000-memory.dmpFilesize
4KB
-
memory/2112-7-0x0000000073EA0000-0x0000000074650000-memory.dmpFilesize
7.7MB
-
memory/2112-8-0x0000000005A50000-0x0000000005AB6000-memory.dmpFilesize
408KB
-
memory/2112-9-0x0000000073EAE000-0x0000000073EAF000-memory.dmpFilesize
4KB
-
memory/2112-10-0x0000000073EA0000-0x0000000074650000-memory.dmpFilesize
7.7MB
-
memory/4000-3-0x0000000000F60000-0x0000000000F78000-memory.dmpFilesize
96KB
-
memory/4000-4-0x0000000000F80000-0x0000000000F98000-memory.dmpFilesize
96KB