Analysis
-
max time kernel
108s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
24-06-2021 07:11
Static task
static1
Behavioral task
behavioral1
Sample
ORDER.exe
Resource
win7v20210410
General
-
Target
ORDER.exe
-
Size
789KB
-
MD5
b954b768fcdca7acd4a9e43715139650
-
SHA1
343bd24a325dfd24f7ccb0ece3052175c7187002
-
SHA256
f35a2268af460c9d1dd472608376c7877aca3b037e030ee6366d2e41a1f25818
-
SHA512
31994bbcfe804827574c2f9148768ceb8c120afbd0c0275b62448b83044c270982f11e813b83c65243782203279540a12eeba84fb67904e8a6b2c73ac7fa2001
Malware Config
Extracted
lokibot
http://192.119.111.43/smack/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ORDER.exedescription pid process target process PID 2576 set thread context of 2584 2576 ORDER.exe ORDER.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
ORDER.exepid process 2576 ORDER.exe 2576 ORDER.exe 2576 ORDER.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
ORDER.exepid process 2584 ORDER.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ORDER.exeORDER.exedescription pid process Token: SeDebugPrivilege 2576 ORDER.exe Token: SeDebugPrivilege 2584 ORDER.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
ORDER.exedescription pid process target process PID 2576 wrote to memory of 2100 2576 ORDER.exe schtasks.exe PID 2576 wrote to memory of 2100 2576 ORDER.exe schtasks.exe PID 2576 wrote to memory of 2100 2576 ORDER.exe schtasks.exe PID 2576 wrote to memory of 2300 2576 ORDER.exe ORDER.exe PID 2576 wrote to memory of 2300 2576 ORDER.exe ORDER.exe PID 2576 wrote to memory of 2300 2576 ORDER.exe ORDER.exe PID 2576 wrote to memory of 2584 2576 ORDER.exe ORDER.exe PID 2576 wrote to memory of 2584 2576 ORDER.exe ORDER.exe PID 2576 wrote to memory of 2584 2576 ORDER.exe ORDER.exe PID 2576 wrote to memory of 2584 2576 ORDER.exe ORDER.exe PID 2576 wrote to memory of 2584 2576 ORDER.exe ORDER.exe PID 2576 wrote to memory of 2584 2576 ORDER.exe ORDER.exe PID 2576 wrote to memory of 2584 2576 ORDER.exe ORDER.exe PID 2576 wrote to memory of 2584 2576 ORDER.exe ORDER.exe PID 2576 wrote to memory of 2584 2576 ORDER.exe ORDER.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER.exe"C:\Users\Admin\AppData\Local\Temp\ORDER.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XAOlwfcRy" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC9CE.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\ORDER.exe"C:\Users\Admin\AppData\Local\Temp\ORDER.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\ORDER.exe"C:\Users\Admin\AppData\Local\Temp\ORDER.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpC9CE.tmpMD5
7d36996237e91b3e622a2459b39f8c1b
SHA1ddaff9f1056b44cf6d4c3361f132e7f8403beb36
SHA2563d1b0e5ee161a6fbb0a3b187775e8f52f5231bd1718e1a3860ade600bd3314b1
SHA5128ed4a7432d3f9aef84a05788e0755ce2f799ff598ee719a130d5d4c76b3cccf6114e10cb8d797aefa8f051ec2e191ca59a537648b357680a03a68d744a93af44
-
memory/2100-124-0x0000000000000000-mapping.dmp
-
memory/2576-118-0x0000000007EB0000-0x0000000007EB1000-memory.dmpFilesize
4KB
-
memory/2576-114-0x0000000000FC0000-0x0000000000FC1000-memory.dmpFilesize
4KB
-
memory/2576-119-0x0000000007D80000-0x0000000007D81000-memory.dmpFilesize
4KB
-
memory/2576-120-0x0000000007D70000-0x000000000826E000-memory.dmpFilesize
5.0MB
-
memory/2576-121-0x0000000008090000-0x00000000080A0000-memory.dmpFilesize
64KB
-
memory/2576-122-0x000000000B340000-0x000000000B3C0000-memory.dmpFilesize
512KB
-
memory/2576-123-0x0000000003300000-0x000000000334D000-memory.dmpFilesize
308KB
-
memory/2576-117-0x0000000007E10000-0x0000000007E11000-memory.dmpFilesize
4KB
-
memory/2576-116-0x0000000008270000-0x0000000008271000-memory.dmpFilesize
4KB
-
memory/2584-126-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/2584-127-0x00000000004139DE-mapping.dmp
-
memory/2584-128-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB