Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 12:10
Static task
static1
Behavioral task
behavioral1
Sample
Purchase-Order.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Purchase-Order.exe
Resource
win10v2004-20220414-en
General
-
Target
Purchase-Order.exe
-
Size
313KB
-
MD5
98eef34a88d5e5764e73ef2f2fdbbe7c
-
SHA1
251153d80c187d77e718520067fa103f7ff06c7f
-
SHA256
84420e6ba6526a6a8ff940b6144497b346e1b0005a9ec7e686025219981d4658
-
SHA512
628e6c2a859f786300fe98ed8e136a7e49d5650b7c630893534f4f6eb6d62cd4ad44c011783cbdaacbf338245454bd815af1996c2a57976c1fcb057499623be9
Malware Config
Extracted
njrat
0.7d
Mon$y
whmfix009.cf:5409
67c692a08f8c138aa1c442e78c2761bc
-
reg_key
67c692a08f8c138aa1c442e78c2761bc
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
invoice.exeinvoice.exepid process 884 invoice.exe 536 invoice.exe -
Loads dropped DLL 1 IoCs
Processes:
Purchase-Order.exepid process 1884 Purchase-Order.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Purchase-Order.exeinvoice.exedescription pid process target process PID 732 set thread context of 1884 732 Purchase-Order.exe Purchase-Order.exe PID 884 set thread context of 536 884 invoice.exe invoice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2044 schtasks.exe 1016 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Purchase-Order.exeinvoice.exepid process 732 Purchase-Order.exe 732 Purchase-Order.exe 732 Purchase-Order.exe 884 invoice.exe 884 invoice.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Purchase-Order.exeinvoice.exedescription pid process Token: SeDebugPrivilege 732 Purchase-Order.exe Token: SeDebugPrivilege 884 invoice.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
Purchase-Order.exePurchase-Order.exeinvoice.exedescription pid process target process PID 732 wrote to memory of 2044 732 Purchase-Order.exe schtasks.exe PID 732 wrote to memory of 2044 732 Purchase-Order.exe schtasks.exe PID 732 wrote to memory of 2044 732 Purchase-Order.exe schtasks.exe PID 732 wrote to memory of 2044 732 Purchase-Order.exe schtasks.exe PID 732 wrote to memory of 1884 732 Purchase-Order.exe Purchase-Order.exe PID 732 wrote to memory of 1884 732 Purchase-Order.exe Purchase-Order.exe PID 732 wrote to memory of 1884 732 Purchase-Order.exe Purchase-Order.exe PID 732 wrote to memory of 1884 732 Purchase-Order.exe Purchase-Order.exe PID 732 wrote to memory of 1884 732 Purchase-Order.exe Purchase-Order.exe PID 732 wrote to memory of 1884 732 Purchase-Order.exe Purchase-Order.exe PID 732 wrote to memory of 1884 732 Purchase-Order.exe Purchase-Order.exe PID 732 wrote to memory of 1884 732 Purchase-Order.exe Purchase-Order.exe PID 732 wrote to memory of 1884 732 Purchase-Order.exe Purchase-Order.exe PID 1884 wrote to memory of 884 1884 Purchase-Order.exe invoice.exe PID 1884 wrote to memory of 884 1884 Purchase-Order.exe invoice.exe PID 1884 wrote to memory of 884 1884 Purchase-Order.exe invoice.exe PID 1884 wrote to memory of 884 1884 Purchase-Order.exe invoice.exe PID 884 wrote to memory of 1016 884 invoice.exe schtasks.exe PID 884 wrote to memory of 1016 884 invoice.exe schtasks.exe PID 884 wrote to memory of 1016 884 invoice.exe schtasks.exe PID 884 wrote to memory of 1016 884 invoice.exe schtasks.exe PID 884 wrote to memory of 536 884 invoice.exe invoice.exe PID 884 wrote to memory of 536 884 invoice.exe invoice.exe PID 884 wrote to memory of 536 884 invoice.exe invoice.exe PID 884 wrote to memory of 536 884 invoice.exe invoice.exe PID 884 wrote to memory of 536 884 invoice.exe invoice.exe PID 884 wrote to memory of 536 884 invoice.exe invoice.exe PID 884 wrote to memory of 536 884 invoice.exe invoice.exe PID 884 wrote to memory of 536 884 invoice.exe invoice.exe PID 884 wrote to memory of 536 884 invoice.exe invoice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase-Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase-Order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fwWXBH" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDB43.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Purchase-Order.exe"{path}"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\invoice.exe"C:\Users\Admin\AppData\Roaming\invoice.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fwWXBH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3083.tmp"4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\invoice.exe"{path}"4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp3083.tmpFilesize
1KB
MD5ddca4a64807f93d8667502a3275e407f
SHA186f069330cac9eb1056b6a3f8e9e11ae333da1ce
SHA2567f722c5faf5557bdb7d27cc85e65567d1d7ce90d12f26be80f7e085f122b5e21
SHA512105903135a85beb14f84c9f142717dba0c671c47df7e70dd92c5210e8deba309bd994af4e7edc9c50997537c62ac40b9abbf8be5674120a1e354fa94947d8d69
-
C:\Users\Admin\AppData\Local\Temp\tmpDB43.tmpFilesize
1KB
MD5ddca4a64807f93d8667502a3275e407f
SHA186f069330cac9eb1056b6a3f8e9e11ae333da1ce
SHA2567f722c5faf5557bdb7d27cc85e65567d1d7ce90d12f26be80f7e085f122b5e21
SHA512105903135a85beb14f84c9f142717dba0c671c47df7e70dd92c5210e8deba309bd994af4e7edc9c50997537c62ac40b9abbf8be5674120a1e354fa94947d8d69
-
C:\Users\Admin\AppData\Roaming\invoice.exeFilesize
313KB
MD598eef34a88d5e5764e73ef2f2fdbbe7c
SHA1251153d80c187d77e718520067fa103f7ff06c7f
SHA25684420e6ba6526a6a8ff940b6144497b346e1b0005a9ec7e686025219981d4658
SHA512628e6c2a859f786300fe98ed8e136a7e49d5650b7c630893534f4f6eb6d62cd4ad44c011783cbdaacbf338245454bd815af1996c2a57976c1fcb057499623be9
-
C:\Users\Admin\AppData\Roaming\invoice.exeFilesize
313KB
MD598eef34a88d5e5764e73ef2f2fdbbe7c
SHA1251153d80c187d77e718520067fa103f7ff06c7f
SHA25684420e6ba6526a6a8ff940b6144497b346e1b0005a9ec7e686025219981d4658
SHA512628e6c2a859f786300fe98ed8e136a7e49d5650b7c630893534f4f6eb6d62cd4ad44c011783cbdaacbf338245454bd815af1996c2a57976c1fcb057499623be9
-
C:\Users\Admin\AppData\Roaming\invoice.exeFilesize
313KB
MD598eef34a88d5e5764e73ef2f2fdbbe7c
SHA1251153d80c187d77e718520067fa103f7ff06c7f
SHA25684420e6ba6526a6a8ff940b6144497b346e1b0005a9ec7e686025219981d4658
SHA512628e6c2a859f786300fe98ed8e136a7e49d5650b7c630893534f4f6eb6d62cd4ad44c011783cbdaacbf338245454bd815af1996c2a57976c1fcb057499623be9
-
\Users\Admin\AppData\Roaming\invoice.exeFilesize
313KB
MD598eef34a88d5e5764e73ef2f2fdbbe7c
SHA1251153d80c187d77e718520067fa103f7ff06c7f
SHA25684420e6ba6526a6a8ff940b6144497b346e1b0005a9ec7e686025219981d4658
SHA512628e6c2a859f786300fe98ed8e136a7e49d5650b7c630893534f4f6eb6d62cd4ad44c011783cbdaacbf338245454bd815af1996c2a57976c1fcb057499623be9
-
memory/536-87-0x000000000040747E-mapping.dmp
-
memory/732-57-0x0000000004190000-0x00000000041C4000-memory.dmpFilesize
208KB
-
memory/732-55-0x0000000075781000-0x0000000075783000-memory.dmpFilesize
8KB
-
memory/732-58-0x0000000000920000-0x000000000092C000-memory.dmpFilesize
48KB
-
memory/732-54-0x0000000000070000-0x00000000000C4000-memory.dmpFilesize
336KB
-
memory/732-56-0x00000000002B0000-0x00000000002C0000-memory.dmpFilesize
64KB
-
memory/884-77-0x0000000000A40000-0x0000000000A94000-memory.dmpFilesize
336KB
-
memory/884-74-0x0000000000000000-mapping.dmp
-
memory/1016-79-0x0000000000000000-mapping.dmp
-
memory/1884-64-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1884-71-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1884-69-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1884-67-0x000000000040747E-mapping.dmp
-
memory/1884-66-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1884-65-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1884-62-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1884-61-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2044-59-0x0000000000000000-mapping.dmp