Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
02-12-2021 13:57
Static task
static1
Behavioral task
behavioral1
Sample
New Order4687334.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
New Order4687334.exe
Resource
win10-en-20211104
General
-
Target
New Order4687334.exe
-
Size
792KB
-
MD5
abc0d5990e243c73bcb0ef52f113c9c8
-
SHA1
a62d9e6614ab925a6ec5ec1d8c8abeb44cf51ef0
-
SHA256
b8baaf727f8da89fe81122fd5c93c3d34b7f3f78ae90403309d7d335e0bb3792
-
SHA512
c33cdb17d07af0b51b4dfdf1a4626ec94ad87d24aef2e4ac8cc17eecdfdfe246224a28e448d321feb4ea70d83a349f822ed46abad7ec1913566b83a2c9bc4fa5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1672 1932 WerFault.exe New Order4687334.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
New Order4687334.exeWerFault.exepowershell.exepid process 1932 New Order4687334.exe 1932 New Order4687334.exe 1932 New Order4687334.exe 1932 New Order4687334.exe 1932 New Order4687334.exe 1932 New Order4687334.exe 1932 New Order4687334.exe 1932 New Order4687334.exe 1932 New Order4687334.exe 1932 New Order4687334.exe 1932 New Order4687334.exe 1932 New Order4687334.exe 1672 WerFault.exe 1672 WerFault.exe 1672 WerFault.exe 1672 WerFault.exe 1672 WerFault.exe 1952 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
New Order4687334.exeWerFault.exepowershell.exedescription pid process Token: SeDebugPrivilege 1932 New Order4687334.exe Token: SeDebugPrivilege 1672 WerFault.exe Token: SeDebugPrivilege 1952 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
New Order4687334.exedescription pid process target process PID 1932 wrote to memory of 1952 1932 New Order4687334.exe powershell.exe PID 1932 wrote to memory of 1952 1932 New Order4687334.exe powershell.exe PID 1932 wrote to memory of 1952 1932 New Order4687334.exe powershell.exe PID 1932 wrote to memory of 1952 1932 New Order4687334.exe powershell.exe PID 1932 wrote to memory of 2004 1932 New Order4687334.exe schtasks.exe PID 1932 wrote to memory of 2004 1932 New Order4687334.exe schtasks.exe PID 1932 wrote to memory of 2004 1932 New Order4687334.exe schtasks.exe PID 1932 wrote to memory of 2004 1932 New Order4687334.exe schtasks.exe PID 1932 wrote to memory of 1672 1932 New Order4687334.exe WerFault.exe PID 1932 wrote to memory of 1672 1932 New Order4687334.exe WerFault.exe PID 1932 wrote to memory of 1672 1932 New Order4687334.exe WerFault.exe PID 1932 wrote to memory of 1672 1932 New Order4687334.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order4687334.exe"C:\Users\Admin\AppData\Local\Temp\New Order4687334.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\lGBqbwYsd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lGBqbwYsd" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5D8B.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 10042⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp5D8B.tmpMD5
4ca49e42e8ae1a967639d7e4133a8f92
SHA1ccc1c557407801eb2ca3f8e83c2759a5384fabdd
SHA25629e1f61fe4dfb82681ed44fbf5b002ffd47c6531d621a21298a3f708474e8ad4
SHA51273b8e02fcaa82e3a94be521953ce42e5c3c2d3a0791d28de96c57afd68889bdf2eff56febfb11496cd46153c9ffb3a8ccd44d131b7e3d579bbba658a3760ae0c
-
memory/1672-65-0x0000000000000000-mapping.dmp
-
memory/1672-67-0x0000000000270000-0x00000000002D0000-memory.dmpFilesize
384KB
-
memory/1932-57-0x0000000075901000-0x0000000075903000-memory.dmpFilesize
8KB
-
memory/1932-58-0x0000000001FF0000-0x0000000001FF1000-memory.dmpFilesize
4KB
-
memory/1932-59-0x00000000006A0000-0x00000000006A8000-memory.dmpFilesize
32KB
-
memory/1932-60-0x00000000050B0000-0x0000000005148000-memory.dmpFilesize
608KB
-
memory/1932-55-0x00000000000D0000-0x00000000000D1000-memory.dmpFilesize
4KB
-
memory/1952-66-0x0000000002430000-0x000000000307A000-memory.dmpFilesize
12.3MB
-
memory/1952-68-0x0000000002430000-0x000000000307A000-memory.dmpFilesize
12.3MB
-
memory/1952-61-0x0000000000000000-mapping.dmp
-
memory/1952-69-0x0000000002430000-0x000000000307A000-memory.dmpFilesize
12.3MB
-
memory/2004-62-0x0000000000000000-mapping.dmp