Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-10-2022 00:27
Static task
static1
Behavioral task
behavioral1
Sample
order confirmation.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
order confirmation.exe
Resource
win10v2004-20220812-en
General
-
Target
order confirmation.exe
-
Size
1.2MB
-
MD5
ce8f7848c768c7db0cb93126e3a53c15
-
SHA1
672e04fd85105dc26fd6ba8b798f79dc1eb7ff04
-
SHA256
9dca638219e066e03580c78ee2911a9a15945f9585861451703ff0b0ac73eb40
-
SHA512
c1d0e096b5327537f753facda3fdc26a9a0b45e4b1cca3356d2d7f4131e0c6ebb04b11c1961a415548617f6ef37a20557ede092f69350440b158947db8cb6c91
-
SSDEEP
12288:Dxa2iNp68hzeFqPFCwflmsGNv+l4Y2+jvbL1YzYPqfIGYVpyADqjJ5nX:A1pwgmBNzQjvb+SNWjrX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
order confirmation.exepid process 1972 order confirmation.exe 1972 order confirmation.exe 1972 order confirmation.exe 1972 order confirmation.exe 1972 order confirmation.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
order confirmation.exedescription pid process Token: SeDebugPrivilege 1972 order confirmation.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
order confirmation.exedescription pid process target process PID 1972 wrote to memory of 1576 1972 order confirmation.exe schtasks.exe PID 1972 wrote to memory of 1576 1972 order confirmation.exe schtasks.exe PID 1972 wrote to memory of 1576 1972 order confirmation.exe schtasks.exe PID 1972 wrote to memory of 1576 1972 order confirmation.exe schtasks.exe PID 1972 wrote to memory of 856 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 856 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 856 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 856 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 948 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 948 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 948 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 948 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 1772 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 1772 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 1772 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 1772 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 944 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 944 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 944 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 944 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 1420 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 1420 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 1420 1972 order confirmation.exe order confirmation.exe PID 1972 wrote to memory of 1420 1972 order confirmation.exe order confirmation.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\order confirmation.exe"C:\Users\Admin\AppData\Local\Temp\order confirmation.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dOfndS" /XML "C:\Users\Admin\AppData\Local\Temp\tmp67D8.tmp"2⤵
- Creates scheduled task(s)
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\order confirmation.exe"{path}"2⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\order confirmation.exe"{path}"2⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\order confirmation.exe"{path}"2⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\order confirmation.exe"{path}"2⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\order confirmation.exe"{path}"2⤵PID:1420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD538ef2d3a82c1d82ebad2be502e4986d6
SHA16b4225313c681aef67d22f11a0290d72064258e8
SHA2563db146951b7db8025d77d9aa3035029ba12577c503579a44364ddbfb3288e47a
SHA512ddc11530d036cf03ce1e23f7ffe8fcf8c1bfbae641a1dce7277aacaa3d6bda5091d6f807a5a2dc1657b34ed10f85d6c6ece01c7849cd675a4e24d3f099a478e2