Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 01:14
Static task
static1
Behavioral task
behavioral1
Sample
Dhl Shipment documents 000004040505060900006000.exe
Resource
win7-20240903-en
General
-
Target
Dhl Shipment documents 000004040505060900006000.exe
-
Size
669KB
-
MD5
ba87031aefecd9e4e2d2046e3448ebae
-
SHA1
bf644d5d7620600abc0c4e789d29673a08d14855
-
SHA256
3b341295bc008e0dc9ae5033dd3f1cc4f3f06de336111045a0be9294cea5beb7
-
SHA512
2fd068e38f9bafcd2487b3c96d55368830f20c83e6398af090b6f3bb361fd2de074f631cf6d93acd0ac245814bd10504d41b6c651225bda84700586dba315d3d
-
SSDEEP
12288:xto55giYSTp3y0NGLgtIzKxtqak136iBxXmAsJb12vROPdmOz5HIhCM3hmm:k56iYSTpCeqgyzKSsBfF1MOzZIh1Am
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sluknende\ketonizes.ini Dhl Shipment documents 000004040505060900006000.exe -
pid Process 744 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhl Shipment documents 000004040505060900006000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 744 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 744 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1920 wrote to memory of 744 1920 Dhl Shipment documents 000004040505060900006000.exe 31 PID 1920 wrote to memory of 744 1920 Dhl Shipment documents 000004040505060900006000.exe 31 PID 1920 wrote to memory of 744 1920 Dhl Shipment documents 000004040505060900006000.exe 31 PID 1920 wrote to memory of 744 1920 Dhl Shipment documents 000004040505060900006000.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dhl Shipment documents 000004040505060900006000.exe"C:\Users\Admin\AppData\Local\Temp\Dhl Shipment documents 000004040505060900006000.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Ellick=Get-Content -Raw 'C:\Users\Admin\AppData\Local\arthrodonteae\kardinaliteter\Reconsecrations\Wooshes.Hja';$Toxicate=$Ellick.SubString(70058,3);.$Toxicate($Ellick)"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:744
-