Analysis
-
max time kernel
140s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-08-2022 16:49
Static task
static1
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
New Order.exe
Resource
win10v2004-20220812-en
General
-
Target
New Order.exe
-
Size
847KB
-
MD5
c606b79a4bc00248caf9a9c34c27967c
-
SHA1
e6023105be92a970a854a3a935786dac7eb24bb4
-
SHA256
4649b0df03857384398c1b95c2e26768ed8a6198499a39d3efdb8d696ede4176
-
SHA512
3849116a967cbd303e138b3e384e433c53cd2779bde4538975c51bd4d8f8fa4b0414dbce17d41d28a1cb23f537ebad6ab60168a3a16349bb8844a48c8c860a72
Malware Config
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 4 IoCs
resource yara_rule behavioral1/memory/1280-79-0x0000000000090000-0x00000000000AA000-memory.dmp family_stormkitty behavioral1/memory/1280-80-0x00000000000A4F6E-mapping.dmp family_stormkitty behavioral1/memory/1280-82-0x0000000000090000-0x00000000000AA000-memory.dmp family_stormkitty behavioral1/memory/1280-84-0x0000000000090000-0x00000000000AA000-memory.dmp family_stormkitty -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2591564548-2301609547-1748242483-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2591564548-2301609547-1748242483-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2591564548-2301609547-1748242483-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1980 set thread context of 664 1980 New Order.exe 31 PID 664 set thread context of 1280 664 New Order.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AppLaunch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2044 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1732 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 664 New Order.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1732 powershell.exe Token: SeDebugPrivilege 1280 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 664 New Order.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1732 1980 New Order.exe 27 PID 1980 wrote to memory of 1732 1980 New Order.exe 27 PID 1980 wrote to memory of 1732 1980 New Order.exe 27 PID 1980 wrote to memory of 1732 1980 New Order.exe 27 PID 1980 wrote to memory of 2044 1980 New Order.exe 29 PID 1980 wrote to memory of 2044 1980 New Order.exe 29 PID 1980 wrote to memory of 2044 1980 New Order.exe 29 PID 1980 wrote to memory of 2044 1980 New Order.exe 29 PID 1980 wrote to memory of 664 1980 New Order.exe 31 PID 1980 wrote to memory of 664 1980 New Order.exe 31 PID 1980 wrote to memory of 664 1980 New Order.exe 31 PID 1980 wrote to memory of 664 1980 New Order.exe 31 PID 1980 wrote to memory of 664 1980 New Order.exe 31 PID 1980 wrote to memory of 664 1980 New Order.exe 31 PID 1980 wrote to memory of 664 1980 New Order.exe 31 PID 1980 wrote to memory of 664 1980 New Order.exe 31 PID 1980 wrote to memory of 664 1980 New Order.exe 31 PID 664 wrote to memory of 1280 664 New Order.exe 32 PID 664 wrote to memory of 1280 664 New Order.exe 32 PID 664 wrote to memory of 1280 664 New Order.exe 32 PID 664 wrote to memory of 1280 664 New Order.exe 32 PID 664 wrote to memory of 1280 664 New Order.exe 32 PID 664 wrote to memory of 1280 664 New Order.exe 32 PID 664 wrote to memory of 1280 664 New Order.exe 32 PID 664 wrote to memory of 1280 664 New Order.exe 32 PID 664 wrote to memory of 1280 664 New Order.exe 32 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2591564548-2301609547-1748242483-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2591564548-2301609547-1748242483-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\QWZdOXeSBeFk.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QWZdOXeSBeFk" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFAB.tmp"2⤵
- Creates scheduled task(s)
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1280
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ebdeb07bdddb66a6f0b273ea06f254d9
SHA15fc91298e805cd0769adc5c1a089910bfbb4f293
SHA2569574473cd05a0245fdbe4e3ab22f1587299cd1a4da8250843e2ba7a69f55c8a0
SHA5125a76199a37c7c06c9593997d2bcbffc2ff27813a8d1ea60fc6b7b036f216dbb5d4e83b03c1fb9fea6c7f4eca2d5d1128b75d892b510a54230006fe8e8076c156