Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Shipping Documents.exe
Resource
win10v2004-20240709-en
General
-
Target
Shipping Documents.exe
-
Size
687KB
-
MD5
10507006212abad8c30928c189093a46
-
SHA1
bb78d1a90b8486ad70157a021362dbc98b3dfc65
-
SHA256
6a4bc7a4ed9d29b26f6448aa110073555deec6bf848f700da258aae494a05732
-
SHA512
8a6cd78753b6300c204ba71165a22d5016cb85459abdc957b0fb317858cec1c54f99ef2e082bd4f46d9ebc09cb7a7a603c1c6d7b8f58dcc823711e4950e32eba
-
SSDEEP
12288:otrlAypL5pboaIMUXDWg3XahlYZVVCpcQfpSQ2vWYEkbewQa2ldqEo:AAyp9pboaIMUTTKhlYTSfp52fSfdq
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2416 set thread context of 1724 2416 Shipping Documents.exe 31 PID 1724 set thread context of 1204 1724 vbc.exe 21 PID 1724 set thread context of 2336 1724 vbc.exe 33 PID 2336 set thread context of 1204 2336 sethc.exe 21 -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2416 Shipping Documents.exe 2416 Shipping Documents.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe 2336 sethc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1724 vbc.exe 1204 Explorer.EXE 1204 Explorer.EXE 2336 sethc.exe 2336 sethc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2416 Shipping Documents.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1644 2416 Shipping Documents.exe 30 PID 2416 wrote to memory of 1644 2416 Shipping Documents.exe 30 PID 2416 wrote to memory of 1644 2416 Shipping Documents.exe 30 PID 2416 wrote to memory of 1644 2416 Shipping Documents.exe 30 PID 2416 wrote to memory of 1724 2416 Shipping Documents.exe 31 PID 2416 wrote to memory of 1724 2416 Shipping Documents.exe 31 PID 2416 wrote to memory of 1724 2416 Shipping Documents.exe 31 PID 2416 wrote to memory of 1724 2416 Shipping Documents.exe 31 PID 2416 wrote to memory of 1724 2416 Shipping Documents.exe 31 PID 2416 wrote to memory of 1724 2416 Shipping Documents.exe 31 PID 2416 wrote to memory of 1724 2416 Shipping Documents.exe 31 PID 1204 wrote to memory of 2336 1204 Explorer.EXE 33 PID 1204 wrote to memory of 2336 1204 Explorer.EXE 33 PID 1204 wrote to memory of 2336 1204 Explorer.EXE 33 PID 1204 wrote to memory of 2336 1204 Explorer.EXE 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:1644
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1724
-
-
-
C:\Windows\SysWOW64\sethc.exe"C:\Windows\SysWOW64\sethc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2336
-