Analysis
-
max time kernel
150s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2022 16:47
Static task
static1
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
New Order.exe
Resource
win10v2004-20220812-en
General
-
Target
New Order.exe
-
Size
847KB
-
MD5
c606b79a4bc00248caf9a9c34c27967c
-
SHA1
e6023105be92a970a854a3a935786dac7eb24bb4
-
SHA256
4649b0df03857384398c1b95c2e26768ed8a6198499a39d3efdb8d696ede4176
-
SHA512
3849116a967cbd303e138b3e384e433c53cd2779bde4538975c51bd4d8f8fa4b0414dbce17d41d28a1cb23f537ebad6ab60168a3a16349bb8844a48c8c860a72
Malware Config
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/4004-153-0x0000000000230000-0x000000000024A000-memory.dmp family_stormkitty -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation New Order.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1556 set thread context of 1696 1556 New Order.exe 82 PID 1696 set thread context of 4004 1696 New Order.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AppLaunch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4480 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1932 powershell.exe 1932 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1696 New Order.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1932 powershell.exe Token: SeDebugPrivilege 4004 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1696 New Order.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1556 wrote to memory of 1932 1556 New Order.exe 78 PID 1556 wrote to memory of 1932 1556 New Order.exe 78 PID 1556 wrote to memory of 1932 1556 New Order.exe 78 PID 1556 wrote to memory of 4480 1556 New Order.exe 80 PID 1556 wrote to memory of 4480 1556 New Order.exe 80 PID 1556 wrote to memory of 4480 1556 New Order.exe 80 PID 1556 wrote to memory of 1696 1556 New Order.exe 82 PID 1556 wrote to memory of 1696 1556 New Order.exe 82 PID 1556 wrote to memory of 1696 1556 New Order.exe 82 PID 1556 wrote to memory of 1696 1556 New Order.exe 82 PID 1556 wrote to memory of 1696 1556 New Order.exe 82 PID 1556 wrote to memory of 1696 1556 New Order.exe 82 PID 1556 wrote to memory of 1696 1556 New Order.exe 82 PID 1556 wrote to memory of 1696 1556 New Order.exe 82 PID 1696 wrote to memory of 4004 1696 New Order.exe 83 PID 1696 wrote to memory of 4004 1696 New Order.exe 83 PID 1696 wrote to memory of 4004 1696 New Order.exe 83 PID 1696 wrote to memory of 4004 1696 New Order.exe 83 PID 1696 wrote to memory of 4004 1696 New Order.exe 83 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\QWZdOXeSBeFk.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QWZdOXeSBeFk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6409.tmp"2⤵
- Creates scheduled task(s)
PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4004
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58b01e1eea7ae3e57104d0c9d484246bf
SHA17f68942efe5593b3623b89ad9ea8256278d50f32
SHA2560cc83e2b4df90b46c7efe90a87c631e1785ccf6733c0d011750728c2af90aee9
SHA5128505ec7201995a01789adf909598d2803cc47755837b96d885b515bf6074d1ff6e3073778f7a892859d17b5c1a8408146bd5ec40bc7a9cf294b03102bfc64e02