Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2022 10:18
Static task
static1
Behavioral task
behavioral1
Sample
order details.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
order details.exe
Resource
win10v2004-20220812-en
General
-
Target
order details.exe
-
Size
23KB
-
MD5
fd4af8f83ebc315989406a87ca804dba
-
SHA1
d482a554d978b86a4886b14c97176c1a3b66174f
-
SHA256
770e60bd6058174717ddc4fd4c194579acd9012d792aa912bcc217ff99bcf17d
-
SHA512
164c2f7e28e35c406e29fd3dad7de7b9bc43648615ca7edbcff182b2355f6681c74e04e31562ad214e54ef0a90afbd03dfe4baeee3941ea5ee8ba91528a6ffca
-
SSDEEP
384:uqchetLLQQ5kVOdCvyh77WlWqVDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDyd+:Yk99clq7WlWqVDDDDDDDDDDDDDDDDDD6
Malware Config
Extracted
bitrat
1.38
103.125.190.185:1234
-
communication_password
827ccb0eea8a706c4c34a16891f84e7b
-
tor_process
tor
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
order details.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation order details.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
order details.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pxywhy = "\"C:\\Users\\Admin\\AppData\\Roaming\\Rkmwylnb\\Pxywhy.exe\"" order details.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
order details.exepid process 4364 order details.exe 4364 order details.exe 4364 order details.exe 4364 order details.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
order details.exedescription pid process target process PID 4172 set thread context of 4364 4172 order details.exe order details.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exeorder details.exepid process 7376 powershell.exe 7376 powershell.exe 4172 order details.exe 4172 order details.exe 4172 order details.exe 4172 order details.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
order details.exepowershell.exeorder details.exedescription pid process Token: SeDebugPrivilege 4172 order details.exe Token: SeDebugPrivilege 7376 powershell.exe Token: SeShutdownPrivilege 4364 order details.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
order details.exepid process 4364 order details.exe 4364 order details.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
order details.exedescription pid process target process PID 4172 wrote to memory of 7376 4172 order details.exe powershell.exe PID 4172 wrote to memory of 7376 4172 order details.exe powershell.exe PID 4172 wrote to memory of 7376 4172 order details.exe powershell.exe PID 4172 wrote to memory of 2636 4172 order details.exe order details.exe PID 4172 wrote to memory of 2636 4172 order details.exe order details.exe PID 4172 wrote to memory of 2636 4172 order details.exe order details.exe PID 4172 wrote to memory of 728 4172 order details.exe order details.exe PID 4172 wrote to memory of 728 4172 order details.exe order details.exe PID 4172 wrote to memory of 728 4172 order details.exe order details.exe PID 4172 wrote to memory of 4364 4172 order details.exe order details.exe PID 4172 wrote to memory of 4364 4172 order details.exe order details.exe PID 4172 wrote to memory of 4364 4172 order details.exe order details.exe PID 4172 wrote to memory of 4364 4172 order details.exe order details.exe PID 4172 wrote to memory of 4364 4172 order details.exe order details.exe PID 4172 wrote to memory of 4364 4172 order details.exe order details.exe PID 4172 wrote to memory of 4364 4172 order details.exe order details.exe PID 4172 wrote to memory of 4364 4172 order details.exe order details.exe PID 4172 wrote to memory of 4364 4172 order details.exe order details.exe PID 4172 wrote to memory of 4364 4172 order details.exe order details.exe PID 4172 wrote to memory of 4364 4172 order details.exe order details.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\order details.exe"C:\Users\Admin\AppData\Local\Temp\order details.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7376 -
C:\Users\Admin\AppData\Local\Temp\order details.exe"C:\Users\Admin\AppData\Local\Temp\order details.exe"2⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\order details.exe"C:\Users\Admin\AppData\Local\Temp\order details.exe"2⤵PID:728
-
C:\Users\Admin\AppData\Local\Temp\order details.exe"C:\Users\Admin\AppData\Local\Temp\order details.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4364