Overview

overview

10

Static

static

#Order#.exe

windows7_x64

7

#Order#.exe

windows10_x64

7

#QTN-20-97...7..exe

windows7_x64

6

#QTN-20-97...7..exe

windows10_x64

5

$70k MT 30JAN.exe

windows7_x64

6

$70k MT 30JAN.exe

windows10_x64

6

03-02-20.exe

windows7_x64

7

03-02-20.exe

windows10_x64

7

20191107145436608.exe

windows7_x64

6

20191107145436608.exe

windows10_x64

6

2019111211...fo.exe

windows7_x64

6

2019111211...fo.exe

windows10_x64

6

2020 ORDERS.exe

windows7_x64

5

2020 ORDERS.exe

windows10_x64

5

624880_ZOC...PT.exe

windows7_x64

6

624880_ZOC...PT.exe

windows10_x64

6

ADMIN DEPT...NT.exe

windows7_x64

8

ADMIN DEPT...NT.exe

windows10_x64

10

AWB_TR0089.exe

windows7_x64

1

AWB_TR0089.exe

windows10_x64

1

Avis de virement.exe

windows7_x64

7

Avis de virement.exe

windows10_x64

8

BL-INVOICE...CS.exe

windows7_x64

6

BL-INVOICE...CS.exe

windows10_x64

6

BMS PO 4820.exe

windows7_x64

6

BMS PO 4820.exe

windows10_x64

6

BSO_191120...df.exe

windows7_x64

6

BSO_191120...df.exe

windows10_x64

6

Bank Information.exe

windows7_x64

6

Bank Information.exe

windows10_x64

6

C.V - Expe...es.exe

windows7_x64

7

C.V - Expe...es.exe

windows10_x64

7

C956PO.exe

windows7_x64

6

C956PO.exe

windows10_x64

6

CIN - U140...32.exe

windows7_x64

6

CIN - U140...32.exe

windows10_x64

6

CV - Resum...ma.exe

windows7_x64

10

CV - Resum...ma.exe

windows10_x64

7

Calendar2Excel.exe

windows7_x64

1

Calendar2Excel.exe

windows10_x64

1

DOC302429042_SDOU.exe

windows7_x64

5

DOC302429042_SDOU.exe

windows10_x64

5

DOC37774732.exe

windows7_x64

6

DOC37774732.exe

windows10_x64

6

Doc _45654.exe

windows7_x64

6

Doc _45654.exe

windows10_x64

6

Docs.exe

windows7_x64

6

Docs.exe

windows10_x64

6

Document_Invoice.exe

windows7_x64

7

Document_Invoice.exe

windows10_x64

7

FOENER RFQ...DF.exe

windows7_x64

6

FOENER RFQ...DF.exe

windows10_x64

6

Following ...ts.exe

windows7_x64

7

Following ...ts.exe

windows10_x64

7

HTQ19-P040...AN.exe

windows7_x64

7

HTQ19-P040...AN.exe

windows10_x64

7

IMAGE221.exe

windows7_x64

8

IMAGE221.exe

windows10_x64

8

Invoice.exe

windows7_x64

6

Invoice.exe

windows10_x64

6

LPO-16155152112.exe

windows7_x64

7

LPO-16155152112.exe

windows10_x64

8

Lëscht vu...lt.exe

windows7_x64

6

Lëscht vu...lt.exe

windows10_x64

6

MT Swift copy.exe

windows7_x64

6

MT Swift copy.exe

windows10_x64

6

NEW P.O-8...FE.exe

windows7_x64

6

NEW P.O-8...FE.exe

windows10_x64

6

NEW P.O -J...20.exe

windows7_x64

6

NEW P.O -J...20.exe

windows10_x64

6

NNBL DRAFT...df.exe

windows7_x64

6

NNBL DRAFT...df.exe

windows10_x64

6

New Order ...05.exe

windows7_x64

6

New Order ...05.exe

windows10_x64

6

New Purcha...er.exe

windows7_x64

8

New Purcha...er.exe

windows10_x64

8

New Year Order.exe

windows7_x64

8

New Year Order.exe

windows10_x64

8

New order ...5).exe

windows7_x64

10

New order ...5).exe

windows10_x64

10

OCEAN BILL...NG.exe

windows7_x64

6

OCEAN BILL...NG.exe

windows10_x64

6

ORDER FILE.exe

windows7_x64

10

ORDER FILE.exe

windows10_x64

10

Order Feb 2020.exe

windows7_x64

6

Order Feb 2020.exe

windows10_x64

6

Order Speciations.exe

windows7_x64

1

Order Speciations.exe

windows10_x64

10

Order list.exe

windows7_x64

8

Order list.exe

windows10_x64

8

P.O.25890.exe

windows7_x64

6

P.O.25890.exe

windows10_x64

6

PAYMENT DE...DF.exe

windows7_x64

10

PAYMENT DE...DF.exe

windows10_x64

10

PDF324561.exe

windows7_x64

6

PDF324561.exe

windows10_x64

6

PO BMS 4820.exe

windows7_x64

6

PO BMS 4820.exe

windows10_x64

6

PO NO.SC-100887.exe

windows7_x64

6

PO NO.SC-100887.exe

windows10_x64

6

PO#32136578.exe

windows7_x64

6

PO#32136578.exe

windows10_x64

6

PO#P-13082...df.exe

windows7_x64

5

PO#P-13082...df.exe

windows10_x64

5

PO-0088PI69.exe

windows7_x64

6

PO-0088PI69.exe

windows10_x64

6

PO-05808T008.exe

windows7_x64

6

PO-05808T008.exe

windows10_x64

6

PO-ABA-098722.exe

windows7_x64

7

PO-ABA-098722.exe

windows10_x64

7

PO. 11092873.exe

windows7_x64

6

PO. 11092873.exe

windows10_x64

6

PO.exe

windows7_x64

6

PO.exe

windows10_x64

6

PO1782020.exe

windows7_x64

10

PO1782020.exe

windows10_x64

10

PO3245_Signed.exe

windows7_x64

10

PO3245_Signed.exe

windows10_x64

10

PRODUCT LIST.exe

windows7_x64

6

PRODUCT LIST.exe

windows10_x64

6

Payment De...ce.exe

windows7_x64

6

Payment De...ce.exe

windows10_x64

6

Payment Details.exe

windows7_x64

10

Payment Details.exe

windows10_x64

10

Photo-Samp...50.exe

windows7_x64

7

Photo-Samp...50.exe

windows10_x64

10

Presupuest...19.exe

windows7_x64

6

Presupuest...19.exe

windows10_x64

6

Proform In...ea.exe

windows7_x64

6

Proform In...ea.exe

windows10_x64

6

Proform Invoice.exe

windows7_x64

6

Proform Invoice.exe

windows10_x64

6

Proforma Invoice.exe

windows7_x64

6

Proforma Invoice.exe

windows10_x64

6

Purchase O...2).exe

windows7_x64

8

Purchase O...2).exe

windows10_x64

8

Purchase Order.exe

windows7_x64

7

Purchase Order.exe

windows10_x64

7

Purchase order.exe

windows7_x64

7

Purchase order.exe

windows10_x64

7

QUOTATION.Pdf.exe

windows7_x64

8

QUOTATION.Pdf.exe

windows10_x64

8

Quotation.exe

windows7_x64

7

Quotation.exe

windows10_x64

7

RFQ2901202...43.exe

windows7_x64

6

RFQ2901202...43.exe

windows10_x64

5

Revised_PO...01.exe

windows7_x64

10

Revised_PO...01.exe

windows10_x64

10

SEA LONGIT...ER.exe

windows7_x64

1

SEA LONGIT...ER.exe

windows10_x64

1

SHIPPING P...76.exe

windows7_x64

6

SHIPPING P...76.exe

windows10_x64

6

SKM_C33501...00.exe

windows7_x64

6

SKM_C33501...00.exe

windows10_x64

6

SOA DEC 2019.exe

windows7_x64

1

SOA DEC 2019.exe

windows10_x64

7

SOA JAN 2020.exe

windows7_x64

6

SOA JAN 2020.exe

windows10_x64

6

SOA.exe

windows7_x64

6

SOA.exe

windows10_x64

6

SP3-139-V1...ER.exe

windows7_x64

8

SP3-139-V1...ER.exe

windows10_x64

8

Scan 50%_s...89.exe

windows7_x64

6

Scan 50%_s...89.exe

windows10_x64

6

Shipment Details.exe

windows7_x64

10

Shipment Details.exe

windows10_x64

10

Shipping D...B).exe

windows7_x64

1

Shipping D...B).exe

windows10_x64

1

Shipping i...t..exe

windows7_x64

6

Shipping i...t..exe

windows10_x64

6

Swift copy.exe

windows7_x64

6

Swift copy.exe

windows10_x64

6

Swift.exe

windows7_x64

10

Swift.exe

windows10_x64

10

TT COPY.exe

windows7_x64

6

TT COPY.exe

windows10_x64

6

TT Statement.exe

windows7_x64

6

TT Statement.exe

windows10_x64

6

The Original Copy.exe

windows7_x64

10

The Original Copy.exe

windows10_x64

7

UPDATE SOA...41.exe

windows7_x64

1

UPDATE SOA...41.exe

windows10_x64

1

URGENT ENQUIRY.exe

windows7_x64

1

URGENT ENQUIRY.exe

windows10_x64

1

Untitled_2...-1.exe

windows7_x64

1

Untitled_2...-1.exe

windows10_x64

7

Unusual lo...ss.exe

windows7_x64

1

Unusual lo...ss.exe

windows10_x64

1

bin_2CE6.exe

windows7_x64

5

bin_2CE6.exe

windows10_x64

6

bin_4B66.exe

windows7_x64

8

bin_4B66.exe

windows10_x64

10

bin_C237.exe

windows7_x64

5

bin_C237.exe

windows10_x64

6

bin_protec...1F.exe

windows7_x64

5

bin_protec...1F.exe

windows10_x64

6

devis.exe

windows7_x64

5

devis.exe

windows10_x64

5

dhl_doc7348255141.exe

windows7_x64

6

dhl_doc7348255141.exe

windows10_x64

6

documento.exe

windows7_x64

7

documento.exe

windows10_x64

7

new order -85486.exe

windows7_x64

6

new order -85486.exe

windows10_x64

6

payment 000012223.exe

windows7_x64

6

payment 000012223.exe

windows10_x64

6

po 23232 signed.exe

windows7_x64

10

po 23232 signed.exe

windows10_x64

10

products inquiry.exe

windows7_x64

6

products inquiry.exe

windows10_x64

6

products_inquiry.exe

windows7_x64

6

products_inquiry.exe

windows10_x64

6

proforma invoice.exe

windows7_x64

6

proforma invoice.exe

windows10_x64

6

purchase o...7..exe

windows7_x64

7

purchase o...7..exe

windows10_x64

7

shipping doc.exe

windows7_x64

6

shipping doc.exe

windows10_x64

6

statement ...nt.exe

windows7_x64

6

statement ...nt.exe

windows10_x64

6

swift.exe

windows7_x64

10

swift.exe

windows10_x64

10

swiftcopy 433.exe

windows7_x64

10

swiftcopy 433.exe

windows10_x64

10

swiftcopy.exe

windows7_x64

10

swiftcopy.exe

windows10_x64

10

updated statement.exe

windows7_x64

6

updated statement.exe

windows10_x64

6

w3TM24p.exe

windows7_x64

1

w3TM24p.exe

windows10_x64

1

Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    windows10_x64
  • resource
    win10v200217
  • submitted
    20-02-2020 07:05

General

  • Target

    SP3-139-V128 ORDER.exe

  • Size

    623KB

  • MD5

    ada6dac710065598c4c5be654823cfa8

  • SHA1

    cc5ca7f098b329a5045678b19cb13febbe30ab9e

  • SHA256

    780de9dbdc4a6adf0fc709f365715fcc86f40a675834a3ba602ff11e20f72505

  • SHA512

    ccd4011b1a8f9b893096c53ef0caede2fe34faf059db41cb455f3a1be864c55620620d4a2bf26f3b9924218b2fff7b9ed7f88262fe724b5ece53c15748146ed1

Score
8/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Reads browser user data or profiles (possible credential harvesting) 2 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 8141 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • Executes dropped EXE 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SP3-139-V128 ORDER.exe
    "C:\Users\Admin\AppData\Local\Temp\SP3-139-V128 ORDER.exe"
    1⤵
    • Adds Run entry to start application
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
      2⤵
      • Drops startup file
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:3264
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2xql0hvr\2xql0hvr.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3536
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDFA2.tmp" "c:\Users\Admin\AppData\Local\Temp\2xql0hvr\CSCD1FCD17D62964DFB869278D7BAFEEA86.TMP"
          4⤵
            PID:2824
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wgzpt1ec\wgzpt1ec.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3104
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE1E4.tmp" "c:\Users\Admin\AppData\Local\Temp\wgzpt1ec\CSC338A6E964D664CA6B45298523A95E5F.TMP"
            4⤵
              PID:4072
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:3404
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3960
            • C:\Windows\SysWOW64\choice.exe
              choice /C Y /N /D Y /T 3
              4⤵
                PID:576
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
              "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe"
              3⤵
              • Drops startup file
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • Executes dropped EXE
              PID:420
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\sxnlvfcr\sxnlvfcr.cmdline"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3800
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFC13.tmp" "c:\Users\Admin\AppData\Local\Temp\sxnlvfcr\CSC7A59C647C1C84120891143B49AB8151.TMP"
                  5⤵
                    PID:4024
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\h1qjopds\h1qjopds.cmdline"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2972
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFDC8.tmp" "c:\Users\Admin\AppData\Local\Temp\h1qjopds\CSC9FC966AF6C84BBCAA57523D560F1CA.TMP"
                    5⤵
                      PID:3804
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    4⤵
                      PID:3108
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      4⤵
                        PID:2824
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe"
                        4⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4092
                        • C:\Windows\SysWOW64\choice.exe
                          choice /C Y /N /D Y /T 3
                          5⤵
                            PID:3256
                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe"
                          4⤵
                          • Executes dropped EXE
                          PID:2188
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 980
                            5⤵
                            • Program crash
                            • Suspicious use of AdjustPrivilegeToken
                            PID:752

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Defense Evasion

                  Modify Registry

                  1
                  T1112

                  Credential Access

                  Credentials in Files

                  1
                  T1081

                  Collection

                  Data from Local System

                  1
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\2xql0hvr\2xql0hvr.dll
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtm
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LcbtqmFeKOyIlbQtma5.exe
                  • C:\Users\Admin\AppData\Local\Temp\RESDFA2.tmp
                  • C:\Users\Admin\AppData\Local\Temp\RESE1E4.tmp
                  • C:\Users\Admin\AppData\Local\Temp\RESFC13.tmp
                  • C:\Users\Admin\AppData\Local\Temp\RESFDC8.tmp
                  • C:\Users\Admin\AppData\Local\Temp\h1qjopds\h1qjopds.dll
                  • C:\Users\Admin\AppData\Local\Temp\sxnlvfcr\sxnlvfcr.dll
                  • C:\Users\Admin\AppData\Local\Temp\wgzpt1ec\wgzpt1ec.dll
                  • \??\c:\Users\Admin\AppData\Local\Temp\2xql0hvr\2xql0hvr.0.cs
                  • \??\c:\Users\Admin\AppData\Local\Temp\2xql0hvr\2xql0hvr.cmdline
                  • \??\c:\Users\Admin\AppData\Local\Temp\2xql0hvr\CSCD1FCD17D62964DFB869278D7BAFEEA86.TMP
                  • \??\c:\Users\Admin\AppData\Local\Temp\h1qjopds\CSC9FC966AF6C84BBCAA57523D560F1CA.TMP
                  • \??\c:\Users\Admin\AppData\Local\Temp\h1qjopds\h1qjopds.0.cs
                  • \??\c:\Users\Admin\AppData\Local\Temp\h1qjopds\h1qjopds.cmdline
                  • \??\c:\Users\Admin\AppData\Local\Temp\sxnlvfcr\CSC7A59C647C1C84120891143B49AB8151.TMP
                  • \??\c:\Users\Admin\AppData\Local\Temp\sxnlvfcr\sxnlvfcr.0.cs
                  • \??\c:\Users\Admin\AppData\Local\Temp\sxnlvfcr\sxnlvfcr.cmdline
                  • \??\c:\Users\Admin\AppData\Local\Temp\wgzpt1ec\CSC338A6E964D664CA6B45298523A95E5F.TMP
                  • \??\c:\Users\Admin\AppData\Local\Temp\wgzpt1ec\wgzpt1ec.0.cs
                  • \??\c:\Users\Admin\AppData\Local\Temp\wgzpt1ec\wgzpt1ec.cmdline
                  • memory/420-25-0x0000000005510000-0x000000000555E000-memory.dmp
                    Filesize

                    312KB

                  • memory/752-28-0x0000000004D20000-0x0000000004D21000-memory.dmp
                    Filesize

                    4KB

                  • memory/752-29-0x0000000005350000-0x0000000005351000-memory.dmp
                    Filesize

                    4KB

                  • memory/3404-13-0x0000000000400000-0x000000000044E000-memory.dmp
                    Filesize

                    312KB