Analysis
-
max time kernel
106s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
05-05-2022 16:57
Static task
static1
Behavioral task
behavioral1
Sample
First Order 1050522.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
First Order 1050522.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
First Order 1050522.exe
-
Size
23KB
-
MD5
0a5658ae9bc75b17d7d591f8411c2b89
-
SHA1
97a8540c7b213ab33231735e73a01f0903e51182
-
SHA256
791b2bf682699cf97e3925dee40ddd5c2cb728e80f798225a7fb0b713c1b1544
-
SHA512
bdcdda71261c750be6c59bfc7daeb113a7d0550fb189941e234189b49b5d4058cee359813ace409045db3cf3c4bef24842fb2a15d0d211ffee939713730cc3d0
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\browser.exe\"," First Order 1050522.exe -
NetWire RAT payload 4 IoCs
resource yara_rule behavioral2/memory/1768-134-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/1768-135-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/1768-136-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral2/memory/1768-137-0x0000000000400000-0x0000000000450000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation First Order 1050522.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4396 set thread context of 1768 4396 First Order 1050522.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 2456 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4396 First Order 1050522.exe 4396 First Order 1050522.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4396 First Order 1050522.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4396 wrote to memory of 504 4396 First Order 1050522.exe 94 PID 4396 wrote to memory of 504 4396 First Order 1050522.exe 94 PID 4396 wrote to memory of 504 4396 First Order 1050522.exe 94 PID 504 wrote to memory of 2456 504 cmd.exe 96 PID 504 wrote to memory of 2456 504 cmd.exe 96 PID 504 wrote to memory of 2456 504 cmd.exe 96 PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe 99 PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe 99 PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe 99 PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe 99 PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe 99 PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe 99 PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe 99 PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe 99 PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe 99 PID 4396 wrote to memory of 1768 4396 First Order 1050522.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\First Order 1050522.exe"C:\Users\Admin\AppData\Local\Temp\First Order 1050522.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 302⤵
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Windows\SysWOW64\timeout.exetimeout 303⤵
- Delays execution with timeout.exe
PID:2456
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵PID:1768
-