Analysis
-
max time kernel
44s -
max time network
16s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
16-04-2021 19:40
Static task
static1
Behavioral task
behavioral1
Sample
NEW order.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
NEW order.exe
Resource
win10v20210410
General
-
Target
NEW order.exe
-
Size
798KB
-
MD5
622f89217d5c630c8493f356a3ed5e23
-
SHA1
c8275a16747ae7c550f1b14e71c91dc06eb1ceef
-
SHA256
f1be45f58c89c8b3b77fda6341568c4388d95ded7597304a04b98c57ddfc4a6c
-
SHA512
e0ecf783296afac12ce6ac7567721f5ae9542047f145fd4f40703840781cf34e5b19229f3df9ffc07981e4b085881ca4a41d3c7076abdc31180fdaf5588d335e
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
NEW order.exepid process 1776 NEW order.exe 1776 NEW order.exe 1776 NEW order.exe 1776 NEW order.exe 1776 NEW order.exe 1776 NEW order.exe 1776 NEW order.exe 1776 NEW order.exe 1776 NEW order.exe 1776 NEW order.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
NEW order.exedescription pid process Token: SeDebugPrivilege 1776 NEW order.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
NEW order.exedescription pid process target process PID 1776 wrote to memory of 1432 1776 NEW order.exe schtasks.exe PID 1776 wrote to memory of 1432 1776 NEW order.exe schtasks.exe PID 1776 wrote to memory of 1432 1776 NEW order.exe schtasks.exe PID 1776 wrote to memory of 1432 1776 NEW order.exe schtasks.exe PID 1776 wrote to memory of 1540 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 1540 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 1540 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 1540 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 608 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 608 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 608 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 608 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 1524 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 1524 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 1524 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 1524 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 1548 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 1548 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 1548 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 1548 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 1004 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 1004 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 1004 1776 NEW order.exe NEW order.exe PID 1776 wrote to memory of 1004 1776 NEW order.exe NEW order.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEW order.exe"C:\Users\Admin\AppData\Local\Temp\NEW order.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KBwCphfzgiBQUi" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3F90.tmp"2⤵
- Creates scheduled task(s)
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\NEW order.exe"{path}"2⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\NEW order.exe"{path}"2⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\NEW order.exe"{path}"2⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\NEW order.exe"{path}"2⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\NEW order.exe"{path}"2⤵PID:1004
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ee391be57ccfbf258c493fc061dc58f6
SHA17855e2149526d579f2b8f15a4880c3302bf47b8c
SHA256eec3236d38e77804926a7fa85b7459c958d7bc1be2a6778326068f8c170fbcab
SHA5126a835f638c1b936efc7a7ee00d3fd4586c326c5c3165bc26a2dc83bb60ebca29434a938c472e875af45ca34961dbc8e534a4f167e5f3c40f6a2e623985a8269e