Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 08:05
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Doc_pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Shipping Doc_pdf.exe
Resource
win10v2004-20240802-en
General
-
Target
Shipping Doc_pdf.exe
-
Size
1.3MB
-
MD5
a77dee88451d2d6f94b5673c0c0218de
-
SHA1
9ad6245a02e6dfdb5066352b3234326a99095801
-
SHA256
699703749f645d5319263f011e94d1df43142528e21028108a92208248d6a540
-
SHA512
c0be91e11f59e1064b54cd48107ff4a8727b209db0a753298570ccc27bc8fc9b9f7b53f5319f5b78dc1b1eff049552a8b632f09b376307f61afa07bec7b14dd4
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLQ5drxHurd+Ex95ZtJ8D+n4Uh1nE5HkxdtproncRKYkv:f3v+7/5QLQ5FxHuB3x9nt+NUh1nEpkfc
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4560 set thread context of 3260 4560 Shipping Doc_pdf.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shipping Doc_pdf.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4560 Shipping Doc_pdf.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3260 svchost.exe 3260 svchost.exe 3260 svchost.exe 3260 svchost.exe 3260 svchost.exe 3260 svchost.exe 3260 svchost.exe 3260 svchost.exe 3260 svchost.exe 3260 svchost.exe 3260 svchost.exe 3260 svchost.exe 3260 svchost.exe 3260 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4560 Shipping Doc_pdf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4560 wrote to memory of 3260 4560 Shipping Doc_pdf.exe 82 PID 4560 wrote to memory of 3260 4560 Shipping Doc_pdf.exe 82 PID 4560 wrote to memory of 3260 4560 Shipping Doc_pdf.exe 82 PID 4560 wrote to memory of 3260 4560 Shipping Doc_pdf.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping Doc_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Doc_pdf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Doc_pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-