Analysis
-
max time kernel
150s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2022 16:49
Static task
static1
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
New Order.exe
Resource
win10v2004-20220812-en
General
-
Target
New Order.exe
-
Size
847KB
-
MD5
c606b79a4bc00248caf9a9c34c27967c
-
SHA1
e6023105be92a970a854a3a935786dac7eb24bb4
-
SHA256
4649b0df03857384398c1b95c2e26768ed8a6198499a39d3efdb8d696ede4176
-
SHA512
3849116a967cbd303e138b3e384e433c53cd2779bde4538975c51bd4d8f8fa4b0414dbce17d41d28a1cb23f537ebad6ab60168a3a16349bb8844a48c8c860a72
Malware Config
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/3044-153-0x0000000000750000-0x000000000076A000-memory.dmp family_stormkitty -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation New Order.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4676 set thread context of 2024 4676 New Order.exe 82 PID 2024 set thread context of 3044 2024 New Order.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AppLaunch.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1224 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5112 powershell.exe 5112 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2024 New Order.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5112 powershell.exe Token: SeDebugPrivilege 3044 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2024 New Order.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4676 wrote to memory of 5112 4676 New Order.exe 78 PID 4676 wrote to memory of 5112 4676 New Order.exe 78 PID 4676 wrote to memory of 5112 4676 New Order.exe 78 PID 4676 wrote to memory of 1224 4676 New Order.exe 80 PID 4676 wrote to memory of 1224 4676 New Order.exe 80 PID 4676 wrote to memory of 1224 4676 New Order.exe 80 PID 4676 wrote to memory of 2024 4676 New Order.exe 82 PID 4676 wrote to memory of 2024 4676 New Order.exe 82 PID 4676 wrote to memory of 2024 4676 New Order.exe 82 PID 4676 wrote to memory of 2024 4676 New Order.exe 82 PID 4676 wrote to memory of 2024 4676 New Order.exe 82 PID 4676 wrote to memory of 2024 4676 New Order.exe 82 PID 4676 wrote to memory of 2024 4676 New Order.exe 82 PID 4676 wrote to memory of 2024 4676 New Order.exe 82 PID 2024 wrote to memory of 3044 2024 New Order.exe 83 PID 2024 wrote to memory of 3044 2024 New Order.exe 83 PID 2024 wrote to memory of 3044 2024 New Order.exe 83 PID 2024 wrote to memory of 3044 2024 New Order.exe 83 PID 2024 wrote to memory of 3044 2024 New Order.exe 83 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\QWZdOXeSBeFk.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QWZdOXeSBeFk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp734B.tmp"2⤵
- Creates scheduled task(s)
PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3044
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58b01e1eea7ae3e57104d0c9d484246bf
SHA17f68942efe5593b3623b89ad9ea8256278d50f32
SHA2560cc83e2b4df90b46c7efe90a87c631e1785ccf6733c0d011750728c2af90aee9
SHA5128505ec7201995a01789adf909598d2803cc47755837b96d885b515bf6074d1ff6e3073778f7a892859d17b5c1a8408146bd5ec40bc7a9cf294b03102bfc64e02