Analysis
-
max time kernel
142s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 12:12
Static task
static1
Behavioral task
behavioral1
Sample
NEW_PURCHASE_ORDER_.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
NEW_PURCHASE_ORDER_.exe
Resource
win10v2004-20220414-en
General
-
Target
NEW_PURCHASE_ORDER_.exe
-
Size
282KB
-
MD5
94cd3aef83f29bb2dd6d8fe40d751603
-
SHA1
eb3439a00509d5e8ba99f97323cf2617d97b3106
-
SHA256
0fa2721f9583ee945d3909290c0ead73dcf4e3cb5739a6f4423f3da6899fd602
-
SHA512
fc78829979bd284924cc752dafd47a9dd6813e59b76c9620bd18eb3fb179db66aa87584600d38e15d0637ba52f8fbd8618b2de836251ae9d0e5b0d5c61b9c0db
Malware Config
Extracted
njrat
0.7d
Mon$y
whmfix009.cf:5409
67c692a08f8c138aa1c442e78c2761bc
-
reg_key
67c692a08f8c138aa1c442e78c2761bc
-
splitter
|'|'|
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
invoice.exepid process 324 invoice.exe -
Loads dropped DLL 1 IoCs
Processes:
NEW_PURCHASE_ORDER_.exepid process 1944 NEW_PURCHASE_ORDER_.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
NEW_PURCHASE_ORDER_.exedescription pid process target process PID 384 set thread context of 1944 384 NEW_PURCHASE_ORDER_.exe NEW_PURCHASE_ORDER_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
NEW_PURCHASE_ORDER_.exeinvoice.exepid process 384 NEW_PURCHASE_ORDER_.exe 384 NEW_PURCHASE_ORDER_.exe 384 NEW_PURCHASE_ORDER_.exe 324 invoice.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
NEW_PURCHASE_ORDER_.exeinvoice.exedescription pid process Token: SeDebugPrivilege 384 NEW_PURCHASE_ORDER_.exe Token: SeDebugPrivilege 324 invoice.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
NEW_PURCHASE_ORDER_.exeNEW_PURCHASE_ORDER_.exedescription pid process target process PID 384 wrote to memory of 2036 384 NEW_PURCHASE_ORDER_.exe schtasks.exe PID 384 wrote to memory of 2036 384 NEW_PURCHASE_ORDER_.exe schtasks.exe PID 384 wrote to memory of 2036 384 NEW_PURCHASE_ORDER_.exe schtasks.exe PID 384 wrote to memory of 2036 384 NEW_PURCHASE_ORDER_.exe schtasks.exe PID 384 wrote to memory of 1944 384 NEW_PURCHASE_ORDER_.exe NEW_PURCHASE_ORDER_.exe PID 384 wrote to memory of 1944 384 NEW_PURCHASE_ORDER_.exe NEW_PURCHASE_ORDER_.exe PID 384 wrote to memory of 1944 384 NEW_PURCHASE_ORDER_.exe NEW_PURCHASE_ORDER_.exe PID 384 wrote to memory of 1944 384 NEW_PURCHASE_ORDER_.exe NEW_PURCHASE_ORDER_.exe PID 384 wrote to memory of 1944 384 NEW_PURCHASE_ORDER_.exe NEW_PURCHASE_ORDER_.exe PID 384 wrote to memory of 1944 384 NEW_PURCHASE_ORDER_.exe NEW_PURCHASE_ORDER_.exe PID 384 wrote to memory of 1944 384 NEW_PURCHASE_ORDER_.exe NEW_PURCHASE_ORDER_.exe PID 384 wrote to memory of 1944 384 NEW_PURCHASE_ORDER_.exe NEW_PURCHASE_ORDER_.exe PID 384 wrote to memory of 1944 384 NEW_PURCHASE_ORDER_.exe NEW_PURCHASE_ORDER_.exe PID 1944 wrote to memory of 324 1944 NEW_PURCHASE_ORDER_.exe invoice.exe PID 1944 wrote to memory of 324 1944 NEW_PURCHASE_ORDER_.exe invoice.exe PID 1944 wrote to memory of 324 1944 NEW_PURCHASE_ORDER_.exe invoice.exe PID 1944 wrote to memory of 324 1944 NEW_PURCHASE_ORDER_.exe invoice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEW_PURCHASE_ORDER_.exe"C:\Users\Admin\AppData\Local\Temp\NEW_PURCHASE_ORDER_.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PVXpBGEUT" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCE58.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\NEW_PURCHASE_ORDER_.exe"{path}"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\invoice.exe"C:\Users\Admin\AppData\Roaming\invoice.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpCE58.tmpFilesize
1KB
MD5880a45b53c1a930111e70009307a0b04
SHA140bbf403adde9d5d180df37c3e48c3061cc6bb1e
SHA2560185e42ae3530889ec5a69a3454c3c9657503a3b2d923af719bfc852a817fcaa
SHA51201ec41e901b31f67af5c4477c854753b7804d55c72ee183eabdd44a623b8e777aa027113e41e20623f7fc2cb11a9035672f90c482e201ae08cf055e5734fd1a5
-
C:\Users\Admin\AppData\Roaming\invoice.exeFilesize
282KB
MD594cd3aef83f29bb2dd6d8fe40d751603
SHA1eb3439a00509d5e8ba99f97323cf2617d97b3106
SHA2560fa2721f9583ee945d3909290c0ead73dcf4e3cb5739a6f4423f3da6899fd602
SHA512fc78829979bd284924cc752dafd47a9dd6813e59b76c9620bd18eb3fb179db66aa87584600d38e15d0637ba52f8fbd8618b2de836251ae9d0e5b0d5c61b9c0db
-
C:\Users\Admin\AppData\Roaming\invoice.exeFilesize
282KB
MD594cd3aef83f29bb2dd6d8fe40d751603
SHA1eb3439a00509d5e8ba99f97323cf2617d97b3106
SHA2560fa2721f9583ee945d3909290c0ead73dcf4e3cb5739a6f4423f3da6899fd602
SHA512fc78829979bd284924cc752dafd47a9dd6813e59b76c9620bd18eb3fb179db66aa87584600d38e15d0637ba52f8fbd8618b2de836251ae9d0e5b0d5c61b9c0db
-
\Users\Admin\AppData\Roaming\invoice.exeFilesize
282KB
MD594cd3aef83f29bb2dd6d8fe40d751603
SHA1eb3439a00509d5e8ba99f97323cf2617d97b3106
SHA2560fa2721f9583ee945d3909290c0ead73dcf4e3cb5739a6f4423f3da6899fd602
SHA512fc78829979bd284924cc752dafd47a9dd6813e59b76c9620bd18eb3fb179db66aa87584600d38e15d0637ba52f8fbd8618b2de836251ae9d0e5b0d5c61b9c0db
-
memory/324-79-0x0000000000830000-0x0000000000864000-memory.dmpFilesize
208KB
-
memory/324-77-0x0000000000F10000-0x0000000000F5C000-memory.dmpFilesize
304KB
-
memory/324-74-0x0000000000000000-mapping.dmp
-
memory/384-55-0x00000000763E1000-0x00000000763E3000-memory.dmpFilesize
8KB
-
memory/384-56-0x00000000003D0000-0x00000000003DA000-memory.dmpFilesize
40KB
-
memory/384-57-0x0000000000660000-0x0000000000694000-memory.dmpFilesize
208KB
-
memory/384-58-0x00000000004B0000-0x00000000004BC000-memory.dmpFilesize
48KB
-
memory/384-54-0x0000000000340000-0x000000000038C000-memory.dmpFilesize
304KB
-
memory/1944-65-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1944-69-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1944-71-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1944-67-0x000000000040747E-mapping.dmp
-
memory/1944-66-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1944-64-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1944-62-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1944-61-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2036-59-0x0000000000000000-mapping.dmp