Analysis
-
max time kernel
147s -
max time network
136s -
platform
windows7_x64 -
resource
win7 -
submitted
09-07-2020 08:27
Static task
static1
Behavioral task
behavioral1
Sample
order.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
order.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
order.exe
-
Size
399KB
-
MD5
d3f4595f210be5a466132637036d72c3
-
SHA1
980d63586e5116fdcbe87fe4e5914429a96f8655
-
SHA256
5962532a97c0efd1227d42aeddeacf09c0f8c8787e476e650d71ceed4ed52d97
-
SHA512
f263c92b4a966c1a5d916ec130a44eb75f87800165a81d9752248eede5f519cad9589e0a597a1249b9c36f2ed0ae0fa6eef445113b86ef934ca19c49b2b392f5
Malware Config
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
order.exeorder.exemsdt.exedescription pid process target process PID 1164 set thread context of 1428 1164 order.exe order.exe PID 1428 set thread context of 1336 1428 order.exe Explorer.EXE PID 872 set thread context of 1336 872 msdt.exe Explorer.EXE -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
Explorer.EXEpid process 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE -
Processes:
Explorer.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
order.exemsdt.exepid process 1428 order.exe 1428 order.exe 1428 order.exe 872 msdt.exe 872 msdt.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 660 cmd.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
order.exeExplorer.EXEmsdt.exedescription pid process target process PID 1164 wrote to memory of 1428 1164 order.exe order.exe PID 1164 wrote to memory of 1428 1164 order.exe order.exe PID 1164 wrote to memory of 1428 1164 order.exe order.exe PID 1164 wrote to memory of 1428 1164 order.exe order.exe PID 1164 wrote to memory of 1428 1164 order.exe order.exe PID 1164 wrote to memory of 1428 1164 order.exe order.exe PID 1164 wrote to memory of 1428 1164 order.exe order.exe PID 1336 wrote to memory of 872 1336 Explorer.EXE msdt.exe PID 1336 wrote to memory of 872 1336 Explorer.EXE msdt.exe PID 1336 wrote to memory of 872 1336 Explorer.EXE msdt.exe PID 1336 wrote to memory of 872 1336 Explorer.EXE msdt.exe PID 872 wrote to memory of 660 872 msdt.exe cmd.exe PID 872 wrote to memory of 660 872 msdt.exe cmd.exe PID 872 wrote to memory of 660 872 msdt.exe cmd.exe PID 872 wrote to memory of 660 872 msdt.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
order.exemsdt.exepid process 1428 order.exe 1428 order.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe 872 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
order.exemsdt.exedescription pid process Token: SeDebugPrivilege 1428 order.exe Token: SeDebugPrivilege 872 msdt.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Checks whether UAC is enabled
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\order.exe"C:\Users\Admin\AppData\Local\Temp\order.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\order.exe"C:\Users\Admin\AppData\Local\Temp\order.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428 -
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\order.exe"3⤵
- Deletes itself
PID:660