Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 14:48
Static task
static1
Behavioral task
behavioral1
Sample
MAERSK Tracking Document.scr
Resource
win7-20241010-en
General
-
Target
MAERSK Tracking Document.scr
-
Size
924KB
-
MD5
3a8f82508c711f924c54faa42d31a59a
-
SHA1
b97dc139f2d5027e74f03b1ef9e0949a83d62c54
-
SHA256
54bd1e36470a85b388bf211308b661eb8f6cf52300ed006a8adaa3d9d087cf9d
-
SHA512
288aa5b52e6082c383385003b806bf75d9ef17990b3fc6acb5cac5e20710b4a0125729d556a907336269c778fc5bd283c2b2d606230f4729f1515be2d5e69545
-
SSDEEP
12288:AiB4sLf+BvqbT+ZJjHKqrKdLazzSYCUZRFRrKdFP55FW/Bw8ytA7RATi+esTCmf:AiB4PlFJWqQLkJezjyBjytA7S2mf
Malware Config
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
MAERSK Tracking Document.scrmsdt.exedescription pid Process procid_target PID 1760 set thread context of 3420 1760 MAERSK Tracking Document.scr 56 PID 1148 set thread context of 3420 1148 msdt.exe 56 -
Drops file in Program Files directory 1 IoCs
Processes:
msdt.exedescription ioc Process File opened for modification C:\Program Files (x86)\Mur08\o4gxqr0joh-6.exe msdt.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MAERSK Tracking Document.scrmsdt.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MAERSK Tracking Document.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
Processes:
MAERSK Tracking Document.scrmsdt.exepid Process 1760 MAERSK Tracking Document.scr 1760 MAERSK Tracking Document.scr 1760 MAERSK Tracking Document.scr 1760 MAERSK Tracking Document.scr 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe 1148 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
MAERSK Tracking Document.scrmsdt.exepid Process 1760 MAERSK Tracking Document.scr 1760 MAERSK Tracking Document.scr 1760 MAERSK Tracking Document.scr 1148 msdt.exe 1148 msdt.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
MAERSK Tracking Document.scrExplorer.EXEmsdt.exedescription pid Process Token: SeDebugPrivilege 1760 MAERSK Tracking Document.scr Token: SeShutdownPrivilege 3420 Explorer.EXE Token: SeCreatePagefilePrivilege 3420 Explorer.EXE Token: SeDebugPrivilege 1148 msdt.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Explorer.EXEmsdt.exedescription pid Process procid_target PID 3420 wrote to memory of 1148 3420 Explorer.EXE 91 PID 3420 wrote to memory of 1148 3420 Explorer.EXE 91 PID 3420 wrote to memory of 1148 3420 Explorer.EXE 91 PID 1148 wrote to memory of 4280 1148 msdt.exe 92 PID 1148 wrote to memory of 4280 1148 msdt.exe 92 PID 1148 wrote to memory of 4280 1148 msdt.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\MAERSK Tracking Document.scr"C:\Users\Admin\AppData\Local\Temp\MAERSK Tracking Document.scr" /S2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\MAERSK Tracking Document.scr"3⤵
- System Location Discovery: System Language Discovery
PID:4280
-
-