Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
DHL9407155789.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
DHL9407155789.exe
Resource
win10v2004-20240802-en
General
-
Target
DHL9407155789.exe
-
Size
845KB
-
MD5
e995ed0c5f64dc6e88685b700caf1e66
-
SHA1
9201951748fb091189c71e1071aa837a8d98c501
-
SHA256
4d58596777616fe9fbb75aef8c3ef57688cb3bab97d8690c850b57a12a84ba5d
-
SHA512
202ed5081268af6c833ac336eef5efa743859e2c9323358836c3fafce4992a1989d93b3279aff90fce38acf8391c5bf4b77a4ce0df5526e2aa06cf7546c2dcce
-
SSDEEP
24576:F/jV/sVIE8t59jPRlPE+NX8Z4kctQKtG89GEv:JjVwa59jZRZ2CJ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 720 set thread context of 3652 720 DHL9407155789.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHL9407155789.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 720 DHL9407155789.exe 720 DHL9407155789.exe 3652 DHL9407155789.exe 3652 DHL9407155789.exe 3652 DHL9407155789.exe 3652 DHL9407155789.exe 3652 DHL9407155789.exe 3652 DHL9407155789.exe 3652 DHL9407155789.exe 3652 DHL9407155789.exe 3652 DHL9407155789.exe 3652 DHL9407155789.exe 3652 DHL9407155789.exe 3652 DHL9407155789.exe 3652 DHL9407155789.exe 3652 DHL9407155789.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 720 DHL9407155789.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 720 wrote to memory of 2836 720 DHL9407155789.exe 95 PID 720 wrote to memory of 2836 720 DHL9407155789.exe 95 PID 720 wrote to memory of 2836 720 DHL9407155789.exe 95 PID 720 wrote to memory of 3652 720 DHL9407155789.exe 96 PID 720 wrote to memory of 3652 720 DHL9407155789.exe 96 PID 720 wrote to memory of 3652 720 DHL9407155789.exe 96 PID 720 wrote to memory of 3652 720 DHL9407155789.exe 96 PID 720 wrote to memory of 3652 720 DHL9407155789.exe 96 PID 720 wrote to memory of 3652 720 DHL9407155789.exe 96 PID 720 wrote to memory of 3652 720 DHL9407155789.exe 96 PID 720 wrote to memory of 3652 720 DHL9407155789.exe 96 PID 720 wrote to memory of 3652 720 DHL9407155789.exe 96 PID 720 wrote to memory of 3652 720 DHL9407155789.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"2⤵PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"C:\Users\Admin\AppData\Local\Temp\DHL9407155789.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-