Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
10-07-2020 17:49
Static task
static1
Behavioral task
behavioral1
Sample
ORDERMOO2#O2-JULY2020.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ORDERMOO2#O2-JULY2020.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
ORDERMOO2#O2-JULY2020.exe
-
Size
608KB
-
MD5
a95901fe4c5694369516e46bf7c8b577
-
SHA1
b8d317bbc7dcc71d520b63f53d0a4b941e0d73d6
-
SHA256
597022d4e4794fb02c89a43939d93d1b2b1140e798e355c2a53a8423f19514ad
-
SHA512
e9f16d61a7d9d9ed97429b252523c82a1aa764b1f3d0195ffbe03a3744540c434685539fcf35d0d2e05e3fe69c965245ef2b3a35297c09fec1e3613d0656a5ac
Score
7/10
Malware Config
Signatures
-
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
ORDERMOO2#O2-JULY2020.exeNETSTAT.EXEpid process 1808 ORDERMOO2#O2-JULY2020.exe 1808 ORDERMOO2#O2-JULY2020.exe 1808 ORDERMOO2#O2-JULY2020.exe 1840 NETSTAT.EXE 1840 NETSTAT.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE 1192 Explorer.EXE -
Processes:
NETSTAT.EXEdescription ioc process Key created \Registry\User\S-1-5-21-910373003-3952921535-3480519689-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 NETSTAT.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
NETSTAT.EXEdescription ioc process File opened for modification C:\Program Files (x86)\Q5jgdwpox\configldfpdxn.exe NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
ORDERMOO2#O2-JULY2020.exeORDERMOO2#O2-JULY2020.exeNETSTAT.EXEdescription pid process Token: SeDebugPrivilege 1092 ORDERMOO2#O2-JULY2020.exe Token: SeDebugPrivilege 1808 ORDERMOO2#O2-JULY2020.exe Token: SeDebugPrivilege 1840 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
ORDERMOO2#O2-JULY2020.exeORDERMOO2#O2-JULY2020.exeNETSTAT.EXEpid process 1092 ORDERMOO2#O2-JULY2020.exe 1808 ORDERMOO2#O2-JULY2020.exe 1808 ORDERMOO2#O2-JULY2020.exe 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE 1840 NETSTAT.EXE -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1780 cmd.exe -
Adds Run entry to start application 2 TTPs 2 IoCs
Processes:
NETSTAT.EXEdescription ioc process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run NETSTAT.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LRH0P2EH5VE = "C:\\Program Files (x86)\\Q5jgdwpox\\configldfpdxn.exe" NETSTAT.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
ORDERMOO2#O2-JULY2020.exeExplorer.EXENETSTAT.EXEdescription pid process target process PID 1092 wrote to memory of 1788 1092 ORDERMOO2#O2-JULY2020.exe ORDERMOO2#O2-JULY2020.exe PID 1092 wrote to memory of 1788 1092 ORDERMOO2#O2-JULY2020.exe ORDERMOO2#O2-JULY2020.exe PID 1092 wrote to memory of 1788 1092 ORDERMOO2#O2-JULY2020.exe ORDERMOO2#O2-JULY2020.exe PID 1092 wrote to memory of 1788 1092 ORDERMOO2#O2-JULY2020.exe ORDERMOO2#O2-JULY2020.exe PID 1092 wrote to memory of 1808 1092 ORDERMOO2#O2-JULY2020.exe ORDERMOO2#O2-JULY2020.exe PID 1092 wrote to memory of 1808 1092 ORDERMOO2#O2-JULY2020.exe ORDERMOO2#O2-JULY2020.exe PID 1092 wrote to memory of 1808 1092 ORDERMOO2#O2-JULY2020.exe ORDERMOO2#O2-JULY2020.exe PID 1092 wrote to memory of 1808 1092 ORDERMOO2#O2-JULY2020.exe ORDERMOO2#O2-JULY2020.exe PID 1092 wrote to memory of 1808 1092 ORDERMOO2#O2-JULY2020.exe ORDERMOO2#O2-JULY2020.exe PID 1092 wrote to memory of 1808 1092 ORDERMOO2#O2-JULY2020.exe ORDERMOO2#O2-JULY2020.exe PID 1092 wrote to memory of 1808 1092 ORDERMOO2#O2-JULY2020.exe ORDERMOO2#O2-JULY2020.exe PID 1192 wrote to memory of 1840 1192 Explorer.EXE NETSTAT.EXE PID 1192 wrote to memory of 1840 1192 Explorer.EXE NETSTAT.EXE PID 1192 wrote to memory of 1840 1192 Explorer.EXE NETSTAT.EXE PID 1192 wrote to memory of 1840 1192 Explorer.EXE NETSTAT.EXE PID 1840 wrote to memory of 1780 1840 NETSTAT.EXE cmd.exe PID 1840 wrote to memory of 1780 1840 NETSTAT.EXE cmd.exe PID 1840 wrote to memory of 1780 1840 NETSTAT.EXE cmd.exe PID 1840 wrote to memory of 1780 1840 NETSTAT.EXE cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ORDERMOO2#O2-JULY2020.exeORDERMOO2#O2-JULY2020.exeNETSTAT.EXEdescription pid process target process PID 1092 set thread context of 1808 1092 ORDERMOO2#O2-JULY2020.exe ORDERMOO2#O2-JULY2020.exe PID 1808 set thread context of 1192 1808 ORDERMOO2#O2-JULY2020.exe Explorer.EXE PID 1840 set thread context of 1192 1840 NETSTAT.EXE Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\ORDERMOO2#O2-JULY2020.exe"C:\Users\Admin\AppData\Local\Temp\ORDERMOO2#O2-JULY2020.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\ORDERMOO2#O2-JULY2020.exe"{path}"3⤵PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\ORDERMOO2#O2-JULY2020.exe"{path}"3⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
PID:1808
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious behavior: MapViewOfSection
- Modifies Internet Explorer settings
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Adds Run entry to start application
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1840 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\ORDERMOO2#O2-JULY2020.exe"3⤵
- Deletes itself
PID:1780
-
-