Analysis

  • max time kernel
    146s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    09/07/2020, 08:27

General

  • Target

    order.exe

  • Size

    399KB

  • MD5

    d3f4595f210be5a466132637036d72c3

  • SHA1

    980d63586e5116fdcbe87fe4e5914429a96f8655

  • SHA256

    5962532a97c0efd1227d42aeddeacf09c0f8c8787e476e650d71ceed4ed52d97

  • SHA512

    f263c92b4a966c1a5d916ec130a44eb75f87800165a81d9752248eede5f519cad9589e0a597a1249b9c36f2ed0ae0fa6eef445113b86ef934ca19c49b2b392f5

Score
8/10

Malware Config

Signatures

  • Drops file in Program Files directory 1 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Adds Run entry to policy start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\order.exe
      "C:\Users\Admin\AppData\Local\Temp\order.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of SetThreadContext
      PID:1820
      • C:\Users\Admin\AppData\Local\Temp\order.exe
        "C:\Users\Admin\AppData\Local\Temp\order.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        PID:3696
    • C:\Windows\SysWOW64\autoconv.exe
      "C:\Windows\SysWOW64\autoconv.exe"
      2⤵
        PID:3648
      • C:\Windows\SysWOW64\netsh.exe
        "C:\Windows\SysWOW64\netsh.exe"
        2⤵
        • Drops file in Program Files directory
        • System policy modification
        • Adds Run entry to policy start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        PID:4036
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\order.exe"
          3⤵
            PID:3960
          • C:\Windows\SysWOW64\cmd.exe
            /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
            3⤵
              PID:3836
            • C:\Program Files\Mozilla Firefox\Firefox.exe
              "C:\Program Files\Mozilla Firefox\Firefox.exe"
              3⤵
                PID:3864

          Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/3696-0-0x0000000000400000-0x000000000042D000-memory.dmp

                  Filesize

                  180KB

                • memory/3864-11-0x00007FF7C4700000-0x00007FF7C4793000-memory.dmp

                  Filesize

                  588KB

                • memory/3864-12-0x00007FF7C4700000-0x00007FF7C4793000-memory.dmp

                  Filesize

                  588KB

                • memory/3864-13-0x00007FF7C4700000-0x00007FF7C4793000-memory.dmp

                  Filesize

                  588KB

                • memory/4036-4-0x0000000000B60000-0x0000000000B7E000-memory.dmp

                  Filesize

                  120KB

                • memory/4036-9-0x00000000057B0000-0x000000000584A000-memory.dmp

                  Filesize

                  616KB

                • memory/4036-3-0x0000000000B60000-0x0000000000B7E000-memory.dmp

                  Filesize

                  120KB