Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 01:26
Static task
static1
Behavioral task
behavioral1
Sample
Dhl shipment documents 0002949400405000599500000.exe
Resource
win7-20240903-en
General
-
Target
Dhl shipment documents 0002949400405000599500000.exe
-
Size
896KB
-
MD5
22a542bc1325916eb1816ebca91fb95b
-
SHA1
88320ab57b6542208dc82b87ba7372c2b43f6aac
-
SHA256
36188bc6b8b6ff6066410e82279f79a7fe8ce638fa0e3b684ff008276689f867
-
SHA512
f7ec8166ef7202cf9f0917c2c5f7215a7ef942250ccba67a4a5ecf16ffbe5f6370ba871baabb4cfb2bcaa403bb83fe5fc41a813e1f5400c8551796068407eec3
-
SSDEEP
24576:cQ2HggprreJ47AsXQLY21226O31A3Rh+1d:aHgfm3XQL+I3q3Rh+1d
Malware Config
Signatures
-
pid Process 2000 powershell.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\hmningerne.Rer45 Dhl shipment documents 0002949400405000599500000.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhl shipment documents 0002949400405000599500000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2000 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2000 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2000 2516 Dhl shipment documents 0002949400405000599500000.exe 30 PID 2516 wrote to memory of 2000 2516 Dhl shipment documents 0002949400405000599500000.exe 30 PID 2516 wrote to memory of 2000 2516 Dhl shipment documents 0002949400405000599500000.exe 30 PID 2516 wrote to memory of 2000 2516 Dhl shipment documents 0002949400405000599500000.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dhl shipment documents 0002949400405000599500000.exe"C:\Users\Admin\AppData\Local\Temp\Dhl shipment documents 0002949400405000599500000.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Quarterdecks=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\Falsetstemmen\nonseparating\adjurors\Hvirvelbevgelsernes.Ikk';$Endothecal=$Quarterdecks.SubString(2893,3);.$Endothecal($Quarterdecks)"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
886B
MD5a420c42fddd7145dfd189640c46e7f9f
SHA1e75effc9e153a9e8298651265e714ea2dec99122
SHA25651c9e9031a8dbe91375b0061cf04a065910954a7bb3b2e88fab507f02be0e79f
SHA5120e32133400e64c9b70b07743969111197ed17312c09340d7c28d1dab312824bfede9a6b4a30ae858b13b2f7784efe399eecc883e6b88d5fef2adc18f52f1ff52