Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
08-07-2020 08:22
Static task
static1
Behavioral task
behavioral1
Sample
New Order & Product Specifications.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
New Order & Product Specifications.exe
Resource
win10
General
-
Target
New Order & Product Specifications.exe
-
Size
515KB
-
MD5
18a279d1c9a0dce2b813171d199c56d7
-
SHA1
b4357015e6f444389310f5afa0d2f9eb2fcc73e5
-
SHA256
263cc7d71099d7f9461b9fbd7fef381bab1b78bf0ecf30b51c27251f56f247f7
-
SHA512
fdcb4ee084edd6013b0eb484b9c8fe5e6c273002f00f6273e2717f7cb2f6bdd729e935e2d21efa29a29034498512503ac4988eaea8ec4970812a6997bc52daca
Malware Config
Signatures
-
Processes:
Explorer.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1072 cmd.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
Explorer.EXEpid process 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE 1284 Explorer.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
NAPSTAT.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer NAPSTAT.EXE -
Processes:
NAPSTAT.EXEdescription ioc process Key created \Registry\User\S-1-5-21-910373003-3952921535-3480519689-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 NAPSTAT.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
New Order & Product Specifications.exeExplorer.EXENAPSTAT.EXEdescription pid process target process PID 1400 wrote to memory of 1420 1400 New Order & Product Specifications.exe New Order & Product Specifications.EXE PID 1400 wrote to memory of 1420 1400 New Order & Product Specifications.exe New Order & Product Specifications.EXE PID 1400 wrote to memory of 1420 1400 New Order & Product Specifications.exe New Order & Product Specifications.EXE PID 1400 wrote to memory of 1420 1400 New Order & Product Specifications.exe New Order & Product Specifications.EXE PID 1400 wrote to memory of 1420 1400 New Order & Product Specifications.exe New Order & Product Specifications.EXE PID 1400 wrote to memory of 1420 1400 New Order & Product Specifications.exe New Order & Product Specifications.EXE PID 1400 wrote to memory of 1420 1400 New Order & Product Specifications.exe New Order & Product Specifications.EXE PID 1284 wrote to memory of 288 1284 Explorer.EXE NAPSTAT.EXE PID 1284 wrote to memory of 288 1284 Explorer.EXE NAPSTAT.EXE PID 1284 wrote to memory of 288 1284 Explorer.EXE NAPSTAT.EXE PID 1284 wrote to memory of 288 1284 Explorer.EXE NAPSTAT.EXE PID 288 wrote to memory of 1072 288 NAPSTAT.EXE cmd.exe PID 288 wrote to memory of 1072 288 NAPSTAT.EXE cmd.exe PID 288 wrote to memory of 1072 288 NAPSTAT.EXE cmd.exe PID 288 wrote to memory of 1072 288 NAPSTAT.EXE cmd.exe PID 288 wrote to memory of 792 288 NAPSTAT.EXE Firefox.exe PID 288 wrote to memory of 792 288 NAPSTAT.EXE Firefox.exe PID 288 wrote to memory of 792 288 NAPSTAT.EXE Firefox.exe PID 288 wrote to memory of 792 288 NAPSTAT.EXE Firefox.exe PID 288 wrote to memory of 792 288 NAPSTAT.EXE Firefox.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
New Order & Product Specifications.EXENAPSTAT.EXEpid process 1420 New Order & Product Specifications.EXE 1420 New Order & Product Specifications.EXE 1420 New Order & Product Specifications.EXE 1420 New Order & Product Specifications.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE -
Adds Run entry to policy start application 2 TTPs 2 IoCs
Processes:
NAPSTAT.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run NAPSTAT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\HTD0QPP0FTV = "C:\\Program Files (x86)\\Njvx8ftbp\\chkdskmrzpsj78.exe" NAPSTAT.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
New Order & Product Specifications.exepid process 1400 New Order & Product Specifications.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
New Order & Product Specifications.EXENAPSTAT.EXEdescription pid process Token: SeDebugPrivilege 1420 New Order & Product Specifications.EXE Token: SeDebugPrivilege 288 NAPSTAT.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 1 IoCs
Processes:
NAPSTAT.EXEdescription ioc process File opened for modification C:\Program Files (x86)\Njvx8ftbp\chkdskmrzpsj78.exe NAPSTAT.EXE -
Suspicious use of SetThreadContext 4 IoCs
Processes:
New Order & Product Specifications.exeNew Order & Product Specifications.EXENAPSTAT.EXEdescription pid process target process PID 1400 set thread context of 1420 1400 New Order & Product Specifications.exe New Order & Product Specifications.EXE PID 1420 set thread context of 1284 1420 New Order & Product Specifications.EXE Explorer.EXE PID 1420 set thread context of 1284 1420 New Order & Product Specifications.EXE Explorer.EXE PID 288 set thread context of 1284 288 NAPSTAT.EXE Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
New Order & Product Specifications.EXENAPSTAT.EXEpid process 1420 New Order & Product Specifications.EXE 1420 New Order & Product Specifications.EXE 1420 New Order & Product Specifications.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE 288 NAPSTAT.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Checks whether UAC is enabled
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\New Order & Product Specifications.exe"C:\Users\Admin\AppData\Local\Temp\New Order & Product Specifications.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
- Suspicious use of SetThreadContext
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\New Order & Product Specifications.EXE"C:\Users\Admin\AppData\Local\Temp\New Order & Product Specifications.EXE"3⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1420 -
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵
- System policy modification
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Adds Run entry to policy start application
- Suspicious use of AdjustPrivilegeToken
- Drops file in Program Files directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:288 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\New Order & Product Specifications.EXE"3⤵
- Deletes itself
PID:1072 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:792