Analysis
-
max time kernel
56s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
05-05-2022 16:57
Static task
static1
Behavioral task
behavioral1
Sample
Second Order 050522.scr.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Second Order 050522.scr.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
Second Order 050522.scr.exe
-
Size
23KB
-
MD5
028e3a8a96adf5e51fb571ff91a602e4
-
SHA1
272e32f9d6f9585439a2abe6b60737198cd40195
-
SHA256
089c37a0afa3e281d1784c54442e67572690496a7795f28d93fa9cc3284e93c4
-
SHA512
49a5befdcae505cf5a13bdd9fcd3993db9462f53f7b127a381a62f8b369304dfc1094d16694b4322ceea29ee02e2f9b4676a93818c5f1c7fc9fcc63ef8749dc2
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\browser.exe\"," Second Order 050522.scr.exe -
NetWire RAT payload 7 IoCs
resource yara_rule behavioral1/memory/524-65-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/524-68-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/524-67-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/524-70-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/524-71-0x000000000041AE7B-mapping.dmp netwire behavioral1/memory/524-74-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/524-75-0x0000000000400000-0x0000000000450000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1416 set thread context of 524 1416 Second Order 050522.scr.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 1980 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1416 Second Order 050522.scr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1416 Second Order 050522.scr.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1736 1416 Second Order 050522.scr.exe 27 PID 1416 wrote to memory of 1736 1416 Second Order 050522.scr.exe 27 PID 1416 wrote to memory of 1736 1416 Second Order 050522.scr.exe 27 PID 1416 wrote to memory of 1736 1416 Second Order 050522.scr.exe 27 PID 1736 wrote to memory of 1980 1736 cmd.exe 29 PID 1736 wrote to memory of 1980 1736 cmd.exe 29 PID 1736 wrote to memory of 1980 1736 cmd.exe 29 PID 1736 wrote to memory of 1980 1736 cmd.exe 29 PID 1416 wrote to memory of 524 1416 Second Order 050522.scr.exe 30 PID 1416 wrote to memory of 524 1416 Second Order 050522.scr.exe 30 PID 1416 wrote to memory of 524 1416 Second Order 050522.scr.exe 30 PID 1416 wrote to memory of 524 1416 Second Order 050522.scr.exe 30 PID 1416 wrote to memory of 524 1416 Second Order 050522.scr.exe 30 PID 1416 wrote to memory of 524 1416 Second Order 050522.scr.exe 30 PID 1416 wrote to memory of 524 1416 Second Order 050522.scr.exe 30 PID 1416 wrote to memory of 524 1416 Second Order 050522.scr.exe 30 PID 1416 wrote to memory of 524 1416 Second Order 050522.scr.exe 30 PID 1416 wrote to memory of 524 1416 Second Order 050522.scr.exe 30 PID 1416 wrote to memory of 524 1416 Second Order 050522.scr.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Second Order 050522.scr.exe"C:\Users\Admin\AppData\Local\Temp\Second Order 050522.scr.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 302⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\timeout.exetimeout 303⤵
- Delays execution with timeout.exe
PID:1980
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵PID:524
-