Analysis
-
max time kernel
106s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
05-05-2022 16:57
Static task
static1
Behavioral task
behavioral1
Sample
First Order 1050522.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
First Order 1050522.exe
Resource
win10v2004-20220414-en
General
-
Target
First Order 1050522.exe
-
Size
23KB
-
MD5
0a5658ae9bc75b17d7d591f8411c2b89
-
SHA1
97a8540c7b213ab33231735e73a01f0903e51182
-
SHA256
791b2bf682699cf97e3925dee40ddd5c2cb728e80f798225a7fb0b713c1b1544
-
SHA512
bdcdda71261c750be6c59bfc7daeb113a7d0550fb189941e234189b49b5d4058cee359813ace409045db3cf3c4bef24842fb2a15d0d211ffee939713730cc3d0
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
First Order 1050522.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\browser.exe\"," First Order 1050522.exe -
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1768-134-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/1768-135-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/1768-136-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/1768-137-0x0000000000400000-0x0000000000450000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
First Order 1050522.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation First Order 1050522.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
First Order 1050522.exedescription pid process target process PID 4396 set thread context of 1768 4396 First Order 1050522.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2456 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
First Order 1050522.exepid process 4396 First Order 1050522.exe 4396 First Order 1050522.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
First Order 1050522.exedescription pid process Token: SeDebugPrivilege 4396 First Order 1050522.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
First Order 1050522.execmd.exedescription pid process target process PID 4396 wrote to memory of 504 4396 First Order 1050522.exe cmd.exe PID 4396 wrote to memory of 504 4396 First Order 1050522.exe cmd.exe PID 4396 wrote to memory of 504 4396 First Order 1050522.exe cmd.exe PID 504 wrote to memory of 2456 504 cmd.exe timeout.exe PID 504 wrote to memory of 2456 504 cmd.exe timeout.exe PID 504 wrote to memory of 2456 504 cmd.exe timeout.exe PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe MSBuild.exe PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe MSBuild.exe PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe MSBuild.exe PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe MSBuild.exe PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe MSBuild.exe PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe MSBuild.exe PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe MSBuild.exe PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe MSBuild.exe PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe MSBuild.exe PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\First Order 1050522.exe"C:\Users\Admin\AppData\Local\Temp\First Order 1050522.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 302⤵
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Windows\SysWOW64\timeout.exetimeout 303⤵
- Delays execution with timeout.exe
PID:2456
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵PID:1768
-