Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
05-05-2022 16:57
Static task
static1
Behavioral task
behavioral1
Sample
Second Order 050522.scr.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Second Order 050522.scr.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
Second Order 050522.scr.exe
-
Size
23KB
-
MD5
028e3a8a96adf5e51fb571ff91a602e4
-
SHA1
272e32f9d6f9585439a2abe6b60737198cd40195
-
SHA256
089c37a0afa3e281d1784c54442e67572690496a7795f28d93fa9cc3284e93c4
-
SHA512
49a5befdcae505cf5a13bdd9fcd3993db9462f53f7b127a381a62f8b369304dfc1094d16694b4322ceea29ee02e2f9b4676a93818c5f1c7fc9fcc63ef8749dc2
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\browser.exe\"," Second Order 050522.scr.exe -
NetWire RAT payload 4 IoCs
resource yara_rule behavioral2/memory/1532-135-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/1532-136-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/1532-137-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/1532-138-0x0000000000400000-0x0000000000450000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation Second Order 050522.scr.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1108 set thread context of 1532 1108 Second Order 050522.scr.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 3136 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1108 Second Order 050522.scr.exe 1108 Second Order 050522.scr.exe 1108 Second Order 050522.scr.exe 1108 Second Order 050522.scr.exe 1108 Second Order 050522.scr.exe 1108 Second Order 050522.scr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1108 Second Order 050522.scr.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1108 wrote to memory of 2684 1108 Second Order 050522.scr.exe 86 PID 1108 wrote to memory of 2684 1108 Second Order 050522.scr.exe 86 PID 1108 wrote to memory of 2684 1108 Second Order 050522.scr.exe 86 PID 2684 wrote to memory of 3136 2684 cmd.exe 88 PID 2684 wrote to memory of 3136 2684 cmd.exe 88 PID 2684 wrote to memory of 3136 2684 cmd.exe 88 PID 1108 wrote to memory of 1768 1108 Second Order 050522.scr.exe 92 PID 1108 wrote to memory of 1768 1108 Second Order 050522.scr.exe 92 PID 1108 wrote to memory of 1768 1108 Second Order 050522.scr.exe 92 PID 1108 wrote to memory of 1532 1108 Second Order 050522.scr.exe 93 PID 1108 wrote to memory of 1532 1108 Second Order 050522.scr.exe 93 PID 1108 wrote to memory of 1532 1108 Second Order 050522.scr.exe 93 PID 1108 wrote to memory of 1532 1108 Second Order 050522.scr.exe 93 PID 1108 wrote to memory of 1532 1108 Second Order 050522.scr.exe 93 PID 1108 wrote to memory of 1532 1108 Second Order 050522.scr.exe 93 PID 1108 wrote to memory of 1532 1108 Second Order 050522.scr.exe 93 PID 1108 wrote to memory of 1532 1108 Second Order 050522.scr.exe 93 PID 1108 wrote to memory of 1532 1108 Second Order 050522.scr.exe 93 PID 1108 wrote to memory of 1532 1108 Second Order 050522.scr.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\Second Order 050522.scr.exe"C:\Users\Admin\AppData\Local\Temp\Second Order 050522.scr.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 302⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\timeout.exetimeout 303⤵
- Delays execution with timeout.exe
PID:3136
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵PID:1768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵PID:1532
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:2908