Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe
Resource
win10v2004-20240802-en
General
-
Target
COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe
-
Size
1.2MB
-
MD5
f7a4c5c83c6cec59cc96222b6ded8198
-
SHA1
474f23a7127790f3eccbb06c0b36bfaed37d225c
-
SHA256
404b5782728673052607ae3e7ede250acf4e7049f34508f31d5c11bed80c3ecc
-
SHA512
06bfa3d3634ed2b8af3e739659b227ea9dce77087dce2abc63d71486b2ebf29b84e3bf6ce7b4d69fde835803efb7fd09e77f0add83a6e988f24a13f831da54c5
-
SSDEEP
24576:PqDEvCTbMWu7rQYlBQcBiT6rprG8aFl1+ITVDgdgT:PTvC/MTQYxsWR7aF3+KWd
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1152 set thread context of 2784 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2784 svchost.exe 2784 svchost.exe 2784 svchost.exe 2784 svchost.exe 2784 svchost.exe 2784 svchost.exe 2784 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2784 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 30 PID 1152 wrote to memory of 2784 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 30 PID 1152 wrote to memory of 2784 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 30 PID 1152 wrote to memory of 2784 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 30 PID 1152 wrote to memory of 2784 1152 COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe"C:\Users\Admin\AppData\Local\Temp\COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\COMMERCAIL INVOICE AND AWB TRACKING DETAILS.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD5d1fa1a4295a32d399c24ba25bef274e1
SHA1b7e776858c33164c1a979a4ec27b9118698bfc42
SHA256d1ed7a18a2b66a5059a6381826a93771d6c6b2bffd5a81c51e069bda56faa01e
SHA51278bfb86c704f0c9bbaa128ab604859752211dd60d7a4f383fb128542ce15b7c61b44aa0fd66d797048a3bd2132c6435c880edaf97200c106b6c3a7eecb103786