Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:15
Static task
static1
Behavioral task
behavioral1
Sample
APPROVE ORDER .exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
APPROVE ORDER .exe
Resource
win10v2004-20220414-en
General
-
Target
APPROVE ORDER .exe
-
Size
400KB
-
MD5
96b3b7fcba7348f92c8b0a888f0bc619
-
SHA1
508fd0984218206747e49d544c829e0b29790f9f
-
SHA256
ee6195ec1370d529ba036d6ce5f7ca391822519455a57817e1576ac8a45b8b8d
-
SHA512
6eb3362a08a121e1203bbacd215d8320c772ed55cb97a78fa2e133b0fc58cc067738f820e16a83bc7ee33db9e5df71dd5f8577faf07a9842acffa3e90db67503
Malware Config
Signatures
-
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
Processes:
resource yara_rule behavioral1/memory/1008-56-0x0000000000410000-0x0000000000418000-memory.dmp coreentity -
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
Processes:
resource yara_rule behavioral1/memory/1728-63-0x0000000000400000-0x0000000000444000-memory.dmp m00nd3v_logger behavioral1/memory/1728-64-0x0000000000400000-0x0000000000444000-memory.dmp m00nd3v_logger behavioral1/memory/1728-65-0x0000000000400000-0x0000000000444000-memory.dmp m00nd3v_logger behavioral1/memory/1728-66-0x000000000043F8EE-mapping.dmp m00nd3v_logger behavioral1/memory/1728-68-0x0000000000400000-0x0000000000444000-memory.dmp m00nd3v_logger behavioral1/memory/1728-70-0x0000000000400000-0x0000000000444000-memory.dmp m00nd3v_logger -
NirSoft MailPassView 13 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/1728-63-0x0000000000400000-0x0000000000444000-memory.dmp MailPassView behavioral1/memory/1728-64-0x0000000000400000-0x0000000000444000-memory.dmp MailPassView behavioral1/memory/1728-65-0x0000000000400000-0x0000000000444000-memory.dmp MailPassView behavioral1/memory/1728-66-0x000000000043F8EE-mapping.dmp MailPassView behavioral1/memory/1728-68-0x0000000000400000-0x0000000000444000-memory.dmp MailPassView behavioral1/memory/1728-70-0x0000000000400000-0x0000000000444000-memory.dmp MailPassView behavioral1/memory/776-81-0x000000000041211A-mapping.dmp MailPassView behavioral1/memory/776-80-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral1/memory/776-84-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral1/memory/776-85-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral1/memory/1892-95-0x000000000041211A-mapping.dmp MailPassView behavioral1/memory/1892-98-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral1/memory/1892-99-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView -
Nirsoft 13 IoCs
Processes:
resource yara_rule behavioral1/memory/1728-63-0x0000000000400000-0x0000000000444000-memory.dmp Nirsoft behavioral1/memory/1728-64-0x0000000000400000-0x0000000000444000-memory.dmp Nirsoft behavioral1/memory/1728-65-0x0000000000400000-0x0000000000444000-memory.dmp Nirsoft behavioral1/memory/1728-66-0x000000000043F8EE-mapping.dmp Nirsoft behavioral1/memory/1728-68-0x0000000000400000-0x0000000000444000-memory.dmp Nirsoft behavioral1/memory/1728-70-0x0000000000400000-0x0000000000444000-memory.dmp Nirsoft behavioral1/memory/776-81-0x000000000041211A-mapping.dmp Nirsoft behavioral1/memory/776-80-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral1/memory/776-84-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral1/memory/776-85-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral1/memory/1892-95-0x000000000041211A-mapping.dmp Nirsoft behavioral1/memory/1892-98-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral1/memory/1892-99-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/1008-57-0x0000000000610000-0x000000000065C000-memory.dmp rezer0 -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
Processes:
vbc.exevbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
APPROVE ORDER .exeMSBuild.exedescription pid process target process PID 1008 set thread context of 1728 1008 APPROVE ORDER .exe MSBuild.exe PID 1728 set thread context of 776 1728 MSBuild.exe vbc.exe PID 1728 set thread context of 1892 1728 MSBuild.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
APPROVE ORDER .exeMSBuild.exedescription pid process target process PID 1008 wrote to memory of 1984 1008 APPROVE ORDER .exe schtasks.exe PID 1008 wrote to memory of 1984 1008 APPROVE ORDER .exe schtasks.exe PID 1008 wrote to memory of 1984 1008 APPROVE ORDER .exe schtasks.exe PID 1008 wrote to memory of 1984 1008 APPROVE ORDER .exe schtasks.exe PID 1008 wrote to memory of 1728 1008 APPROVE ORDER .exe MSBuild.exe PID 1008 wrote to memory of 1728 1008 APPROVE ORDER .exe MSBuild.exe PID 1008 wrote to memory of 1728 1008 APPROVE ORDER .exe MSBuild.exe PID 1008 wrote to memory of 1728 1008 APPROVE ORDER .exe MSBuild.exe PID 1008 wrote to memory of 1728 1008 APPROVE ORDER .exe MSBuild.exe PID 1008 wrote to memory of 1728 1008 APPROVE ORDER .exe MSBuild.exe PID 1008 wrote to memory of 1728 1008 APPROVE ORDER .exe MSBuild.exe PID 1008 wrote to memory of 1728 1008 APPROVE ORDER .exe MSBuild.exe PID 1008 wrote to memory of 1728 1008 APPROVE ORDER .exe MSBuild.exe PID 1728 wrote to memory of 776 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 776 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 776 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 776 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 776 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 776 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 776 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 776 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 776 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 776 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 1892 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 1892 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 1892 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 1892 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 1892 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 1892 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 1892 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 1892 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 1892 1728 MSBuild.exe vbc.exe PID 1728 wrote to memory of 1892 1728 MSBuild.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\APPROVE ORDER .exe"C:\Users\Admin\AppData\Local\Temp\APPROVE ORDER .exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ohsbzTbXG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp272.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp2453.tmp"3⤵
- Accesses Microsoft Outlook accounts
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpD828.tmp"3⤵
- Accesses Microsoft Outlook accounts
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp272.tmpFilesize
1KB
MD5c8428c6b1c6189e5934f84432897cc15
SHA1faf612d66a6204d62ced8e378e584a75b41abb20
SHA2564bf1af5f7c39c2efd7cf295386d91683dc77429b5cd5fdd2b7bf02ee6fd63a66
SHA5126c094572c95a5fb7a8ba62845a176d0e2eb7c5315311b2c56c4d5b44ca5fbfc99abe8697273eb780f8ac0bb4dc258b6e9700ea3e289a228c2705f80869458873
-
memory/776-78-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/776-73-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/776-75-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/776-72-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/776-85-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/776-77-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/776-84-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/776-80-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/776-81-0x000000000041211A-mapping.dmp
-
memory/1008-57-0x0000000000610000-0x000000000065C000-memory.dmpFilesize
304KB
-
memory/1008-54-0x0000000000810000-0x000000000087A000-memory.dmpFilesize
424KB
-
memory/1008-56-0x0000000000410000-0x0000000000418000-memory.dmpFilesize
32KB
-
memory/1008-55-0x0000000075FC1000-0x0000000075FC3000-memory.dmpFilesize
8KB
-
memory/1728-60-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/1728-70-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/1728-68-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/1728-66-0x000000000043F8EE-mapping.dmp
-
memory/1728-65-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/1728-64-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/1728-63-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/1728-61-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/1892-95-0x000000000041211A-mapping.dmp
-
memory/1892-98-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/1892-99-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/1984-58-0x0000000000000000-mapping.dmp