Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
16-07-2020 07:17
Static task
static1
Behavioral task
behavioral1
Sample
order.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
order.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
order.exe
-
Size
503KB
-
MD5
a280142137b1aeb5e45c793e2ab317dc
-
SHA1
ba95a539e94f0a82f2140522902d770730e76aaa
-
SHA256
95574ab20f094a30ec1f5d3cd6694e6afd0a5c4809e0151f5bd2b427bbbb33df
-
SHA512
c52605c490dce8d9e98bfa5a28d68a738e5ff3e817820439e0bb86c5d07a556c5df5df640e5527f0da33e8b0557ae547c2cc9b8d2d0460ceb6baf151764b6f37
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1220 cmd.exe -
Looks for VMWare Tools registry key 2 TTPs
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Eadil_rg\mfcadfh1n.exe explorer.exe -
description ioc Process Key created \Registry\User\S-1-5-21-910373003-3952921535-3480519689-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 explorer.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FLJPPREH = "C:\\Program Files (x86)\\Eadil_rg\\mfcadfh1n.exe" explorer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1432 wrote to memory of 1864 1432 order.exe 27 PID 1432 wrote to memory of 1864 1432 order.exe 27 PID 1432 wrote to memory of 1864 1432 order.exe 27 PID 1432 wrote to memory of 1864 1432 order.exe 27 PID 1432 wrote to memory of 1752 1432 order.exe 28 PID 1432 wrote to memory of 1752 1432 order.exe 28 PID 1432 wrote to memory of 1752 1432 order.exe 28 PID 1432 wrote to memory of 1752 1432 order.exe 28 PID 1432 wrote to memory of 1752 1432 order.exe 28 PID 1432 wrote to memory of 1752 1432 order.exe 28 PID 1432 wrote to memory of 1752 1432 order.exe 28 PID 1312 wrote to memory of 468 1312 Explorer.EXE 29 PID 1312 wrote to memory of 468 1312 Explorer.EXE 29 PID 1312 wrote to memory of 468 1312 Explorer.EXE 29 PID 1312 wrote to memory of 468 1312 Explorer.EXE 29 PID 468 wrote to memory of 1220 468 explorer.exe 30 PID 468 wrote to memory of 1220 468 explorer.exe 30 PID 468 wrote to memory of 1220 468 explorer.exe 30 PID 468 wrote to memory of 1220 468 explorer.exe 30 PID 468 wrote to memory of 1540 468 explorer.exe 33 PID 468 wrote to memory of 1540 468 explorer.exe 33 PID 468 wrote to memory of 1540 468 explorer.exe 33 PID 468 wrote to memory of 1540 468 explorer.exe 33 PID 468 wrote to memory of 1540 468 explorer.exe 33 -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1432 order.exe 1432 order.exe 1752 order.exe 1752 order.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1432 set thread context of 1752 1432 order.exe 28 PID 1752 set thread context of 1312 1752 order.exe 20 PID 468 set thread context of 1312 468 explorer.exe 20 -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1752 order.exe 1752 order.exe 1752 order.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe 468 explorer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion order.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion order.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum order.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 order.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1432 order.exe Token: SeDebugPrivilege 1752 order.exe Token: SeDebugPrivilege 468 explorer.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE -
Looks for VirtualBox Guest Additions in registry 2 TTPs
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- Suspicious use of SendNotifyMessage
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\order.exe"C:\Users\Admin\AppData\Local\Temp\order.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\order.exe"{path}"3⤵PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\order.exe"{path}"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:468 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\order.exe"3⤵
- Deletes itself
PID:1220
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1540
-
-