Analysis
-
max time kernel
81s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 22:45
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER.exe
Resource
win10v2004-20220414-en
General
-
Target
PURCHASE ORDER.exe
-
Size
758KB
-
MD5
0c2b2237be9d61afea6f62cd4edff9e4
-
SHA1
18a3b3b9ebd80d8cb12ec18b749a9e843e0c3ea8
-
SHA256
c7be8b5b17f15893c49c1748052bee41cbbb574b2aa6ede4923e01ccdaded68d
-
SHA512
765bc8139fbc6f8c8b90eea9a9f3b9981051f4227ae2f8de40518cb4df9899e0755773f1a6f425dbfdfa6b203f88d02b6101d7cd58e9e316a64fa5636b4ac461
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
PURCHASE ORDER.exepid process 1628 PURCHASE ORDER.exe 1628 PURCHASE ORDER.exe 1628 PURCHASE ORDER.exe 1628 PURCHASE ORDER.exe 1628 PURCHASE ORDER.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
PURCHASE ORDER.exedescription pid process Token: SeDebugPrivilege 1628 PURCHASE ORDER.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
PURCHASE ORDER.exedescription pid process target process PID 1628 wrote to memory of 1736 1628 PURCHASE ORDER.exe schtasks.exe PID 1628 wrote to memory of 1736 1628 PURCHASE ORDER.exe schtasks.exe PID 1628 wrote to memory of 1736 1628 PURCHASE ORDER.exe schtasks.exe PID 1628 wrote to memory of 1736 1628 PURCHASE ORDER.exe schtasks.exe PID 1628 wrote to memory of 1360 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 1360 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 1360 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 1360 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 1068 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 1068 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 1068 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 1068 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 1144 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 1144 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 1144 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 1144 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 1496 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 1496 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 1496 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 1496 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 792 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 792 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 792 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 1628 wrote to memory of 792 1628 PURCHASE ORDER.exe PURCHASE ORDER.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tbnuJUjuNEXt" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8EB9.tmp"2⤵
- Creates scheduled task(s)
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"2⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"2⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"2⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"2⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"2⤵PID:792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e33398f5924b8e14d4a5b50d719b4bbd
SHA1314199ed75c8c3a5d4555e56a91ed89395b3f6d9
SHA256cc39e77a32652f275a63f85e15b8bd3137fcfb9b2ded24020ec10173549d798a
SHA512b33629566aa8e9e0ffd95010a1cc0c60bbec1680ec142c2687098df9c4aa4b0192183597403002414aeb394e8a4922135fad849265f222292d7f9e66058e0a74