Analysis
-
max time kernel
140s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
DHL report.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DHL report.exe
Resource
win10v2004-20250217-en
General
-
Target
DHL report.exe
-
Size
48KB
-
MD5
1b290a481650c19ae56a4c247fd6d421
-
SHA1
d7de13eff1c16d4771c1dce902644448e45a541d
-
SHA256
2c383dd4d6b713394e7983af6b541c95dbe5f3a7bcefd4d043f1bc71ef79c2ca
-
SHA512
4aebcbaa643b72310da722c1b29b6f41cb125346ccc357799797fc84b69ff528ae3cb9e7ee9476db0dc2998ee7eff4deabe58e255626044c865997b209223899
-
SSDEEP
768:WfrCsUQPEE9TjcLF9vihb1+cDcF69GXF+2YrviNYW4xTM:WzNUgEE9TQLkccDc3XF+2Jv41
Malware Config
Signatures
-
Andromeda family
-
Detects Andromeda payload. 2 IoCs
resource yara_rule behavioral1/memory/2152-9-0x0000000000020000-0x0000000000025000-memory.dmp family_andromeda behavioral1/memory/2152-13-0x0000000000020000-0x0000000000025000-memory.dmp family_andromeda -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\52206 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msshvo.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe -
Deletes itself 1 IoCs
pid Process 2152 svchost.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum DHL report.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 DHL report.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msshvo.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHL report.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2428 DHL report.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2428 DHL report.exe 2428 DHL report.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2152 2428 DHL report.exe 30 PID 2428 wrote to memory of 2152 2428 DHL report.exe 30 PID 2428 wrote to memory of 2152 2428 DHL report.exe 30 PID 2428 wrote to memory of 2152 2428 DHL report.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL report.exe"C:\Users\Admin\AppData\Local\Temp\DHL report.exe"1⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe2⤵
- Adds policy Run key to start application
- Deletes itself
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2152
-