Analysis

  • max time kernel
    38s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 22:50

General

  • Target

    New Order.exe

  • Size

    427KB

  • MD5

    9fa90422f13ff85f849c28367ad97e11

  • SHA1

    7c920bb3c70c1f133d7b7a12df8f4ce6f1a262fa

  • SHA256

    23f570b95cb1580bf303918349c89d37bfefa19c76dc269b8af9be2438693da4

  • SHA512

    5aa6e87e75eeb356135b907a913e63289cf4465b7134c89f40b8d8046b5c99323781e754bda8eed0097f3f8788d01ca695af90620779f1f9034a870cfca412d9

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New Order.exe
    "C:\Users\Admin\AppData\Local\Temp\New Order.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Users\Admin\AppData\Local\Temp\New Order.exe
      "{path}"
      2⤵
        PID:912
      • C:\Users\Admin\AppData\Local\Temp\New Order.exe
        "{path}"
        2⤵
          PID:916
        • C:\Users\Admin\AppData\Local\Temp\New Order.exe
          "{path}"
          2⤵
            PID:1716
          • C:\Users\Admin\AppData\Local\Temp\New Order.exe
            "{path}"
            2⤵
              PID:1412
            • C:\Users\Admin\AppData\Local\Temp\New Order.exe
              "{path}"
              2⤵
                PID:1152

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1676-54-0x0000000076451000-0x0000000076453000-memory.dmp

              Filesize

              8KB

            • memory/1676-55-0x0000000074910000-0x0000000074EBB000-memory.dmp

              Filesize

              5.7MB