Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
21-07-2022 05:51
Static task
static1
Behavioral task
behavioral1
Sample
ORDER SMAPLES.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
ORDER SMAPLES.exe
Resource
win10v2004-20220414-en
General
-
Target
ORDER SMAPLES.exe
-
Size
2.1MB
-
MD5
507da88c0faa082c6a5974a173feafef
-
SHA1
62bb282d4214dfde18242f77f19f818127552e1d
-
SHA256
1b9c9b834da58ea5a48a29ecb1fa94be9745a48484417ff2caf6ed70f1a50cbd
-
SHA512
793c3370f347cd3dbc47d198bcb8069667cc1e37e09fd9f669ff05ac950b7d741993c981da8ef1982c4ed325b7e952c17b437cd9b266c3faffe541fe72158a19
Malware Config
Extracted
bitrat
1.38
103.153.79.240:1234
-
communication_password
e10adc3949ba59abbe56e057f20f883e
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ORDER SMAPLES.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\Saeawr = "\"C:\\Users\\Admin\\AppData\\Roaming\\Oiodqpy\\Saeawr.exe\"" ORDER SMAPLES.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
InstallUtil.exepid process 108 InstallUtil.exe 108 InstallUtil.exe 108 InstallUtil.exe 108 InstallUtil.exe 108 InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ORDER SMAPLES.exedescription pid process target process PID 860 set thread context of 108 860 ORDER SMAPLES.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exeORDER SMAPLES.exepid process 984 powershell.exe 860 ORDER SMAPLES.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exeORDER SMAPLES.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 984 powershell.exe Token: SeDebugPrivilege 860 ORDER SMAPLES.exe Token: SeDebugPrivilege 108 InstallUtil.exe Token: SeShutdownPrivilege 108 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
InstallUtil.exepid process 108 InstallUtil.exe 108 InstallUtil.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
ORDER SMAPLES.exedescription pid process target process PID 860 wrote to memory of 984 860 ORDER SMAPLES.exe powershell.exe PID 860 wrote to memory of 984 860 ORDER SMAPLES.exe powershell.exe PID 860 wrote to memory of 984 860 ORDER SMAPLES.exe powershell.exe PID 860 wrote to memory of 984 860 ORDER SMAPLES.exe powershell.exe PID 860 wrote to memory of 108 860 ORDER SMAPLES.exe InstallUtil.exe PID 860 wrote to memory of 108 860 ORDER SMAPLES.exe InstallUtil.exe PID 860 wrote to memory of 108 860 ORDER SMAPLES.exe InstallUtil.exe PID 860 wrote to memory of 108 860 ORDER SMAPLES.exe InstallUtil.exe PID 860 wrote to memory of 108 860 ORDER SMAPLES.exe InstallUtil.exe PID 860 wrote to memory of 108 860 ORDER SMAPLES.exe InstallUtil.exe PID 860 wrote to memory of 108 860 ORDER SMAPLES.exe InstallUtil.exe PID 860 wrote to memory of 108 860 ORDER SMAPLES.exe InstallUtil.exe PID 860 wrote to memory of 108 860 ORDER SMAPLES.exe InstallUtil.exe PID 860 wrote to memory of 108 860 ORDER SMAPLES.exe InstallUtil.exe PID 860 wrote to memory of 108 860 ORDER SMAPLES.exe InstallUtil.exe PID 860 wrote to memory of 108 860 ORDER SMAPLES.exe InstallUtil.exe PID 860 wrote to memory of 108 860 ORDER SMAPLES.exe InstallUtil.exe PID 860 wrote to memory of 108 860 ORDER SMAPLES.exe InstallUtil.exe PID 860 wrote to memory of 108 860 ORDER SMAPLES.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER SMAPLES.exe"C:\Users\Admin\AppData\Local\Temp\ORDER SMAPLES.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:108