Analysis
-
max time kernel
91s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 01:50
Static task
static1
Behavioral task
behavioral1
Sample
Order-411546.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Order-411546.exe
Resource
win10v2004-20220414-en
General
-
Target
Order-411546.exe
-
Size
806KB
-
MD5
22ffcd520fe68ef6d11c131577091fff
-
SHA1
08ba8ae52078a1ad86ea3b8bde4f619b23d0eb04
-
SHA256
c8174141c60baa057aa9780fdb5fe1e4af59b9d3a9d5a1d8ab7d929b13d3882b
-
SHA512
f53c611e64a76cf46be0c8941edf987e0f25db0c4682d15aa60d595fddb4ead053f3fdd3d0cb0996d13f76a6e2ce1dcf2ecd15db6debabe5ef44b0a91478eac7
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Order-411546.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Order-411546.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation Order-411546.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Order-411546.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Order-411546.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4628 set thread context of 4816 4628 Order-411546.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3524 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4628 Order-411546.exe 1688 powershell.exe 1688 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4628 Order-411546.exe Token: SeDebugPrivilege 1688 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4628 wrote to memory of 3524 4628 Order-411546.exe 86 PID 4628 wrote to memory of 3524 4628 Order-411546.exe 86 PID 4628 wrote to memory of 3524 4628 Order-411546.exe 86 PID 4628 wrote to memory of 4816 4628 Order-411546.exe 88 PID 4628 wrote to memory of 4816 4628 Order-411546.exe 88 PID 4628 wrote to memory of 4816 4628 Order-411546.exe 88 PID 4628 wrote to memory of 4816 4628 Order-411546.exe 88 PID 4628 wrote to memory of 4816 4628 Order-411546.exe 88 PID 4628 wrote to memory of 4816 4628 Order-411546.exe 88 PID 4628 wrote to memory of 4816 4628 Order-411546.exe 88 PID 4628 wrote to memory of 4816 4628 Order-411546.exe 88 PID 4816 wrote to memory of 4136 4816 Order-411546.exe 89 PID 4816 wrote to memory of 4136 4816 Order-411546.exe 89 PID 4816 wrote to memory of 4136 4816 Order-411546.exe 89 PID 4136 wrote to memory of 1688 4136 cmd.exe 91 PID 4136 wrote to memory of 1688 4136 cmd.exe 91 PID 4136 wrote to memory of 1688 4136 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order-411546.exe"C:\Users\Admin\AppData\Local\Temp\Order-411546.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CCllnFRcWGdXpZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp536F.tmp"2⤵
- Creates scheduled task(s)
PID:3524
-
-
C:\Users\Admin\AppData\Local\Temp\Order-411546.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Order-411546.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Order-411546.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c17b9ea2f46c2a49181facc730b8215e
SHA15956e73ffe08e1b80cdc7ea76b5763726c579383
SHA256a71f3ec0863c33f8dca2020e1237c5b0af7b18ed9cfebba03d57b8fc71b55db5
SHA5128d32ecac4fdd71b992f3f6598b4cf20b2666cdcce295c3aa6156c1ff1a75247f66fa3d9f7cf66d0fdb2c699e2b76c3b6e12e6079b1f5eb7fb6e0f7f793706d56
-
Filesize
1KB
MD5372ee4f7db987696b0bf18a6c1fd1e9c
SHA177b43c6a3c96cbdd127923477c5ec04ad69b0bcf
SHA256e0b4232606decaf4991bd85b7ac93647b1f14d29eae569c5620799d899b9f7f8
SHA512033f556a13a4c55c22f5379daaf6276ab17781713b8432c059e228db75857c7eb205520755baa298de735cce12ed102913430ca94fd04b09cbb386fbed959bc1