Analysis
-
max time kernel
315s -
max time network
1588s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
25/07/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
Resource
win10v2004-20240709-en
General
-
Target
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
-
Size
1.1MB
-
MD5
5ec011058b0884bc3b13563f97231c58
-
SHA1
9846a460d630ea60c476df6dc92ae10d902bb54f
-
SHA256
bc5a7642799c2f22d513dc19fb87848ecbe002f1815b2d5fd3a5af3fdbcdf0ae
-
SHA512
d3172fe1fc90a3e8e4331bb4eeae03377825e26a815636c8931890fa9c1f8290eafa8c293e22b218d37f79a9202e62c5a5b13df40a14ebb828814a3797262523
-
SSDEEP
24576:gqDEvCTbMWu7rQYlBQcBiT6rprG8apamXjozThdab7:gTvC/MTQYxsWR7ap7wn
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4812 5080 WerFault.exe 72 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5080 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5080 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 5080 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 5080 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 5080 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5080 wrote to memory of 216 5080 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 73 PID 5080 wrote to memory of 216 5080 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 73 PID 5080 wrote to memory of 216 5080 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"C:\Users\Admin\AppData\Local\Temp\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"2⤵PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 6882⤵
- Program crash
PID:4812
-