Analysis
-
max time kernel
101s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-05-2022 09:12
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order NO#XL005465 pdf.exe
Resource
win7-20220414-en
General
-
Target
Purchase Order NO#XL005465 pdf.exe
-
Size
596KB
-
MD5
422bfefe6ab8872a886c7b43a64c2375
-
SHA1
a2311ff345e7eb8cc4ce7cc380a14cd34062b762
-
SHA256
3a01de5d3ac9d4bc94221c451ab5fb25d154b032c7b7e8d20f5cbb380434beed
-
SHA512
8ba97d4d10b89d0acd2864a3f44a62cdcd4e71dada6f4b67f81597d0ce940c28c145c31b5950b5efa544fbb77c1a46bfbe82c596ee94f9d8f347ab0678cd02bb
Malware Config
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2268-143-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/2268-144-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/2268-145-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/2268-148-0x0000000000400000-0x0000000000450000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Purchase Order NO#XL005465 pdf.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation Purchase Order NO#XL005465 pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Purchase Order NO#XL005465 pdf.exedescription pid process target process PID 4748 set thread context of 2268 4748 Purchase Order NO#XL005465 pdf.exe Purchase Order NO#XL005465 pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
Purchase Order NO#XL005465 pdf.exepowershell.exepid process 4748 Purchase Order NO#XL005465 pdf.exe 4748 Purchase Order NO#XL005465 pdf.exe 4748 Purchase Order NO#XL005465 pdf.exe 4748 Purchase Order NO#XL005465 pdf.exe 4748 Purchase Order NO#XL005465 pdf.exe 4748 Purchase Order NO#XL005465 pdf.exe 4748 Purchase Order NO#XL005465 pdf.exe 4748 Purchase Order NO#XL005465 pdf.exe 3252 powershell.exe 4748 Purchase Order NO#XL005465 pdf.exe 3252 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Purchase Order NO#XL005465 pdf.exepowershell.exedescription pid process Token: SeDebugPrivilege 4748 Purchase Order NO#XL005465 pdf.exe Token: SeDebugPrivilege 3252 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
Purchase Order NO#XL005465 pdf.exedescription pid process target process PID 4748 wrote to memory of 3252 4748 Purchase Order NO#XL005465 pdf.exe powershell.exe PID 4748 wrote to memory of 3252 4748 Purchase Order NO#XL005465 pdf.exe powershell.exe PID 4748 wrote to memory of 3252 4748 Purchase Order NO#XL005465 pdf.exe powershell.exe PID 4748 wrote to memory of 4972 4748 Purchase Order NO#XL005465 pdf.exe schtasks.exe PID 4748 wrote to memory of 4972 4748 Purchase Order NO#XL005465 pdf.exe schtasks.exe PID 4748 wrote to memory of 4972 4748 Purchase Order NO#XL005465 pdf.exe schtasks.exe PID 4748 wrote to memory of 204 4748 Purchase Order NO#XL005465 pdf.exe Purchase Order NO#XL005465 pdf.exe PID 4748 wrote to memory of 204 4748 Purchase Order NO#XL005465 pdf.exe Purchase Order NO#XL005465 pdf.exe PID 4748 wrote to memory of 204 4748 Purchase Order NO#XL005465 pdf.exe Purchase Order NO#XL005465 pdf.exe PID 4748 wrote to memory of 2268 4748 Purchase Order NO#XL005465 pdf.exe Purchase Order NO#XL005465 pdf.exe PID 4748 wrote to memory of 2268 4748 Purchase Order NO#XL005465 pdf.exe Purchase Order NO#XL005465 pdf.exe PID 4748 wrote to memory of 2268 4748 Purchase Order NO#XL005465 pdf.exe Purchase Order NO#XL005465 pdf.exe PID 4748 wrote to memory of 2268 4748 Purchase Order NO#XL005465 pdf.exe Purchase Order NO#XL005465 pdf.exe PID 4748 wrote to memory of 2268 4748 Purchase Order NO#XL005465 pdf.exe Purchase Order NO#XL005465 pdf.exe PID 4748 wrote to memory of 2268 4748 Purchase Order NO#XL005465 pdf.exe Purchase Order NO#XL005465 pdf.exe PID 4748 wrote to memory of 2268 4748 Purchase Order NO#XL005465 pdf.exe Purchase Order NO#XL005465 pdf.exe PID 4748 wrote to memory of 2268 4748 Purchase Order NO#XL005465 pdf.exe Purchase Order NO#XL005465 pdf.exe PID 4748 wrote to memory of 2268 4748 Purchase Order NO#XL005465 pdf.exe Purchase Order NO#XL005465 pdf.exe PID 4748 wrote to memory of 2268 4748 Purchase Order NO#XL005465 pdf.exe Purchase Order NO#XL005465 pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order NO#XL005465 pdf.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order NO#XL005465 pdf.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BTyCTg.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BTyCTg" /XML "C:\Users\Admin\AppData\Local\Temp\tmp51C9.tmp"2⤵
- Creates scheduled task(s)
PID:4972
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order NO#XL005465 pdf.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order NO#XL005465 pdf.exe"2⤵PID:204
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order NO#XL005465 pdf.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order NO#XL005465 pdf.exe"2⤵PID:2268
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f01a4103fa35f75509f536232577db36
SHA1013d073eda95c2033f2faefcf1c9dcaf55d8b111
SHA25642358a59c06a49bc7bb7d124cf39b44627c33449a77862bfc03c133a338db2a5
SHA512dee2cea188a9bd2f28adf737980fcb06efa6f29602099d1a0d27435a26ba3de3b3660ab3122171eaf79b60dceca482cc9f3de4ada61cd81e31357b9f41befb76