Analysis

  • max time kernel
    159s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 23:57

General

  • Target

    Order_List_new.exe

  • Size

    1.0MB

  • MD5

    5af0260ca877578fd4e919e9902b2d3e

  • SHA1

    59d6cc6dab99c90f0fd303f16ca2879b8dbf7cbc

  • SHA256

    0fd0591e79669d6016acff95109efd434cc39498d83f4ebdaac67c96091e4fa9

  • SHA512

    d278eb77b2327ad9777fddb55dd86a29dab9ac509345c4e502268f494897c5769e8e8c5712e6d712459b6b4cf0c9c88dc0c28ee91a4246be186c9dc929d55cc9

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Order_List_new.exe
    "C:\Users\Admin\AppData\Local\Temp\Order_List_new.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4532
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HnBNubuyhC" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC61F.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:4240
    • C:\Users\Admin\AppData\Local\Temp\Order_List_new.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Windows\SysWOW64\cmd.exe
        "cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Order_List_new.exe' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5108
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Order_List_new.exe'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4180

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Order_List_new.exe.log

    Filesize

    412B

    MD5

    ad1c7f6525cfeb54c0487efd38b0e26c

    SHA1

    ed3da94723ac7e3828a9e93d68418bb810592f3b

    SHA256

    0a534a3d0fa82e6a427164c5f6e702cac7e4afc9967af9bc5ddba4f84ab33276

    SHA512

    48d625e6be5391d91d95c2850226fe39bb2411cb72139797699cfe126e6b066182e83950a8ea67e63b64a66b0d45f58d8bc97cab0363d55c2fd88c0d1d28009c

  • C:\Users\Admin\AppData\Local\Temp\tmpC61F.tmp

    Filesize

    1KB

    MD5

    f4892af901b25f4275ce3072a2d11297

    SHA1

    061dd7861b03e8ee1f402b3a3106b050671b5133

    SHA256

    52fecf28f593e97e23e8fd09de8774fb9daabf38529b893b95029881b8574706

    SHA512

    1eefb7922d08c66d74edb4908dd4dc29862cb6da80493cc219b2593150aa066f4d13187654532b6bd9b90859f2c232e0120e08257b6f1a43fa4bac8b56a2755a

  • memory/2312-136-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2312-139-0x0000000005430000-0x0000000005496000-memory.dmp

    Filesize

    408KB

  • memory/2312-138-0x0000000005850000-0x0000000005DF4000-memory.dmp

    Filesize

    5.6MB

  • memory/2312-135-0x0000000000000000-mapping.dmp

  • memory/4180-145-0x0000000005D80000-0x0000000005DE6000-memory.dmp

    Filesize

    408KB

  • memory/4180-146-0x0000000006410000-0x000000000642E000-memory.dmp

    Filesize

    120KB

  • memory/4180-150-0x00000000069C0000-0x00000000069E2000-memory.dmp

    Filesize

    136KB

  • memory/4180-149-0x0000000007490000-0x0000000007526000-memory.dmp

    Filesize

    600KB

  • memory/4180-148-0x00000000068F0000-0x000000000690A000-memory.dmp

    Filesize

    104KB

  • memory/4180-141-0x0000000000000000-mapping.dmp

  • memory/4180-142-0x0000000004F40000-0x0000000004F76000-memory.dmp

    Filesize

    216KB

  • memory/4180-143-0x0000000005650000-0x0000000005C78000-memory.dmp

    Filesize

    6.2MB

  • memory/4180-144-0x0000000005460000-0x0000000005482000-memory.dmp

    Filesize

    136KB

  • memory/4180-147-0x0000000007A70000-0x00000000080EA000-memory.dmp

    Filesize

    6.5MB

  • memory/4240-133-0x0000000000000000-mapping.dmp

  • memory/4532-130-0x0000000000E30000-0x0000000000F3A000-memory.dmp

    Filesize

    1.0MB

  • memory/4532-131-0x0000000005CD0000-0x0000000005D6C000-memory.dmp

    Filesize

    624KB

  • memory/4532-132-0x0000000005E10000-0x0000000005EA2000-memory.dmp

    Filesize

    584KB

  • memory/5108-140-0x0000000000000000-mapping.dmp