Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
DHL report.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DHL report.exe
Resource
win10v2004-20250217-en
General
-
Target
DHL report.exe
-
Size
48KB
-
MD5
1b290a481650c19ae56a4c247fd6d421
-
SHA1
d7de13eff1c16d4771c1dce902644448e45a541d
-
SHA256
2c383dd4d6b713394e7983af6b541c95dbe5f3a7bcefd4d043f1bc71ef79c2ca
-
SHA512
4aebcbaa643b72310da722c1b29b6f41cb125346ccc357799797fc84b69ff528ae3cb9e7ee9476db0dc2998ee7eff4deabe58e255626044c865997b209223899
-
SSDEEP
768:WfrCsUQPEE9TjcLF9vihb1+cDcF69GXF+2YrviNYW4xTM:WzNUgEE9TQLkccDc3XF+2Jv41
Malware Config
Signatures
-
Andromeda family
-
Detects Andromeda payload. 2 IoCs
resource yara_rule behavioral2/memory/4548-10-0x00000000008D0000-0x00000000008D5000-memory.dmp family_andromeda behavioral2/memory/4548-14-0x00000000008D0000-0x00000000008D5000-memory.dmp family_andromeda -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\30870 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msjhsvp.bat" svchost.exe -
Deletes itself 1 IoCs
pid Process 4548 svchost.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum DHL report.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DHL report.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msjhsvp.bat svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHL report.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1180 DHL report.exe 1180 DHL report.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1180 DHL report.exe 1180 DHL report.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1180 wrote to memory of 4548 1180 DHL report.exe 87 PID 1180 wrote to memory of 4548 1180 DHL report.exe 87 PID 1180 wrote to memory of 4548 1180 DHL report.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL report.exe"C:\Users\Admin\AppData\Local\Temp\DHL report.exe"1⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe2⤵
- Adds policy Run key to start application
- Deletes itself
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4548
-