Analysis
-
max time kernel
95s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 06:10
Behavioral task
behavioral1
Sample
ΕΓΓΡΑΦΟ ΤΙΜΟΛΟΓΙΟΥ DHL Ελλάδα Α.Ε.bat.exe
Resource
win7-20240903-en
General
-
Target
ΕΓΓΡΑΦΟ ΤΙΜΟΛΟΓΙΟΥ DHL Ελλάδα Α.Ε.bat.exe
-
Size
100.0MB
-
MD5
091cf2e005afc7393a16a1644e19af9c
-
SHA1
489ca79f7b9cc5af77c9d281e2b5b8289d49bd30
-
SHA256
8b4d29d39c1085b7e1fa42bbbb8a0b38b8ae615eaa1d152f4c09756fde5f1b23
-
SHA512
4619afb10efa219156acbcf08aba716f2c5cd35b6f0f4fbdad94fb0dcfc840565324161f529a844560fada11f019211d687a44ae21b909ce32592539807fed50
-
SSDEEP
12288:LXe9PPlowWX0t6mOQwg1Qd15CcYk0We1F2OKY4+5PMmXICU9t6j:ShloDX0XOf43h4bmXIC2G
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3748-0-0x0000000000A40000-0x0000000000B98000-memory.dmp upx behavioral2/memory/3748-14-0x0000000000A40000-0x0000000000B98000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3748-14-0x0000000000A40000-0x0000000000B98000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5092 3748 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ΕΓΓΡΑΦΟ ΤΙΜΟΛΟΓΙΟΥ DHL Ελλάδα Α.Ε.bat.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3748 ΕΓΓΡΑΦΟ ΤΙΜΟΛΟΓΙΟΥ DHL Ελλάδα Α.Ε.bat.exe 3748 ΕΓΓΡΑΦΟ ΤΙΜΟΛΟΓΙΟΥ DHL Ελλάδα Α.Ε.bat.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3748 ΕΓΓΡΑΦΟ ΤΙΜΟΛΟΓΙΟΥ DHL Ελλάδα Α.Ε.bat.exe 3748 ΕΓΓΡΑΦΟ ΤΙΜΟΛΟΓΙΟΥ DHL Ελλάδα Α.Ε.bat.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3748 wrote to memory of 940 3748 ΕΓΓΡΑΦΟ ΤΙΜΟΛΟΓΙΟΥ DHL Ελλάδα Α.Ε.bat.exe 86 PID 3748 wrote to memory of 940 3748 ΕΓΓΡΑΦΟ ΤΙΜΟΛΟΓΙΟΥ DHL Ελλάδα Α.Ε.bat.exe 86 PID 3748 wrote to memory of 940 3748 ΕΓΓΡΑΦΟ ΤΙΜΟΛΟΓΙΟΥ DHL Ελλάδα Α.Ε.bat.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ΕΓΓΡΑΦΟ ΤΙΜΟΛΟΓΙΟΥ DHL Ελλάδα Α.Ε.bat.exe"C:\Users\Admin\AppData\Local\Temp\ΕΓΓΡΑΦΟ ΤΙΜΟΛΟΓΙΟΥ DHL Ελλάδα Α.Ε.bat.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\ΕΓΓΡΑΦΟ ΤΙΜΟΛΟΓΙΟΥ DHL Ελλάδα Α.Ε.bat.exe"2⤵PID:940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 8322⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 3748 -ip 37481⤵PID:1104