Analysis
-
max time kernel
56s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
05-05-2022 16:57
Static task
static1
Behavioral task
behavioral1
Sample
First Order 1050522.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
First Order 1050522.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
First Order 1050522.exe
-
Size
23KB
-
MD5
0a5658ae9bc75b17d7d591f8411c2b89
-
SHA1
97a8540c7b213ab33231735e73a01f0903e51182
-
SHA256
791b2bf682699cf97e3925dee40ddd5c2cb728e80f798225a7fb0b713c1b1544
-
SHA512
bdcdda71261c750be6c59bfc7daeb113a7d0550fb189941e234189b49b5d4058cee359813ace409045db3cf3c4bef24842fb2a15d0d211ffee939713730cc3d0
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\browser.exe\"," First Order 1050522.exe -
NetWire RAT payload 7 IoCs
resource yara_rule behavioral1/memory/468-65-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/468-67-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/468-68-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/468-71-0x000000000041AE7B-mapping.dmp netwire behavioral1/memory/468-70-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/468-74-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/468-75-0x0000000000400000-0x0000000000450000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1836 set thread context of 468 1836 First Order 1050522.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 932 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1836 First Order 1050522.exe 1836 First Order 1050522.exe 1836 First Order 1050522.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1836 First Order 1050522.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1836 wrote to memory of 1200 1836 First Order 1050522.exe 28 PID 1836 wrote to memory of 1200 1836 First Order 1050522.exe 28 PID 1836 wrote to memory of 1200 1836 First Order 1050522.exe 28 PID 1836 wrote to memory of 1200 1836 First Order 1050522.exe 28 PID 1200 wrote to memory of 932 1200 cmd.exe 30 PID 1200 wrote to memory of 932 1200 cmd.exe 30 PID 1200 wrote to memory of 932 1200 cmd.exe 30 PID 1200 wrote to memory of 932 1200 cmd.exe 30 PID 1836 wrote to memory of 268 1836 First Order 1050522.exe 31 PID 1836 wrote to memory of 268 1836 First Order 1050522.exe 31 PID 1836 wrote to memory of 268 1836 First Order 1050522.exe 31 PID 1836 wrote to memory of 268 1836 First Order 1050522.exe 31 PID 1836 wrote to memory of 468 1836 First Order 1050522.exe 32 PID 1836 wrote to memory of 468 1836 First Order 1050522.exe 32 PID 1836 wrote to memory of 468 1836 First Order 1050522.exe 32 PID 1836 wrote to memory of 468 1836 First Order 1050522.exe 32 PID 1836 wrote to memory of 468 1836 First Order 1050522.exe 32 PID 1836 wrote to memory of 468 1836 First Order 1050522.exe 32 PID 1836 wrote to memory of 468 1836 First Order 1050522.exe 32 PID 1836 wrote to memory of 468 1836 First Order 1050522.exe 32 PID 1836 wrote to memory of 468 1836 First Order 1050522.exe 32 PID 1836 wrote to memory of 468 1836 First Order 1050522.exe 32 PID 1836 wrote to memory of 468 1836 First Order 1050522.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\First Order 1050522.exe"C:\Users\Admin\AppData\Local\Temp\First Order 1050522.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 302⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\timeout.exetimeout 303⤵
- Delays execution with timeout.exe
PID:932
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵PID:268
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵PID:468
-