Analysis
-
max time kernel
188s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2022 14:33
Static task
static1
Behavioral task
behavioral1
Sample
NEWorder2022FILE8876.exe
Resource
win7-20221111-en
General
-
Target
NEWorder2022FILE8876.exe
-
Size
829KB
-
MD5
443188c8e6b449066d99f49d1b715e92
-
SHA1
7ebde06ed2558ad169e7b779ac2f7bc8bc758ef0
-
SHA256
15046684df239f63119e30eadc6a71abbfece9080bb3a6a1d4f7b0899ee47409
-
SHA512
1c063339b87ebe67daf14c58f20cbe917885d12ff3d1161e8e7180752710819c5b1aea92b104130d3a42beaa5906691938656c0f394591d2e2ba3beb5de31fee
-
SSDEEP
12288:D3YNF3wX+sJMgCEdhJlxnFrQ9dI640gfHtY/h8uSW7rbLxPkgUUj5TX:j8GlJMkdhVnaHI6ufNkUEpaE
Malware Config
Extracted
formbook
4u5a
Y9HWoINcPu0r7SSSKt4FCmk7
G/E64auYdhRQM4wZW2bcOaY=
bL57APty/StRpW49a+EdxA==
TppryJ0SoslHe8gJFVc=
HXxDShYIEcUJDahdv2nvl5Hlbp4=
EKaq5c6w0nV3WWlEqM4Www==
VM+YjE8XS1OLcH1roYF4zA==
OwK0wxmBGnq2Fg==
B1zy4bulyfY9tj9DK2eIkeYArpTt
Avj5JeA8m9girqfQ4+cZxA==
AOY4dmDFkCdX8HUJMw==
5cQUw3pPMYr07V8=
P7ZsN4/zt63AEw==
FYyVCOpB8Vl//kSkDLPo91Yy
jxwZTBp+5gcsccPxDF+K4bDG2Rpp0A==
iGx9AO58DRhZbXX9
prwVyLkAtlhSU6irmansg8wArpTt
uqa8ZPl+FFObOkdFNg==
tL4OhF22EDaEOkdFNg==
6exH76Z9o7eu/n86vgPE
rJfvmmO0I0KSOkdFNg==
fWeyPQpzFxdBSlPuAlA=
imNhpGXCQjOgCw==
KOLqYk7Qy278+j3g
A4mLyKgkynW7jZZt0F8=
380eDrCm3ApZbXX9
1k6VTs/04X8=
6yQgD+RiKrbnhr77i60lI/gyAQ==
rST4Evf891bSukI=
wYh6yzBy3wDSOkdFNg==
i0j/88JPuMOz
1t8w27cIepbAIqSh0G5dsiUnCw==
uI6hQB6EIE+bFW1woYF4zA==
BPL0Pin+82dmW/OhB0Fr5JHlbp4=
XC5/ZktMXzEnk+xGrPFSE+st
srT4c1/AacoX8F0=
zJeU2qIZ2VCSOkdFNg==
j4a8RbuBvuFZbXX9
asVC+9b7w7eu
L6UfqgNtQjOgCw==
yTgIJt0+qNUilvojOWqqBypDFg==
Ie006MzYHidZbXX9
fbVjId1kpfdZbXX9
w7z+dzqeJEZq2/A6vgPE
bkyOQjI+MYr07V8=
EODzbkTAOSJZbXX9
sZXWleMz4n7HrUI=
YuK38tZjKZ3eQJnC3jxvdM7D2Rpp0A==
VTJSAfJU7tISaHT/
d/gIXE8qLIr07V8=
F3XypWdIKor07V8=
uQaJTBhc8R4kr/I6vgPE
1T8ENSkKJLudaZZt0F8=
uc4eyKuvBidZbXX9
txCp1rM0oc4LhQHpKYJQUKKktIT3GWoNJw==
RMLQh/ZpQjOgCw==
0+Qt17zBCyNZbXX9
JC6jMCHmB77Eu/EFdap62w==
t4XGRQqC3kSB9Tpds2j0Wrg=
T7hCMhTkzX2mf4lVAQjjJOgz
DQ6VYEicGU+NFio7Lw==
PCpjzoTZU3Ol9T1coYF4zA==
DxVl5Jum/t5orqfQ4+cZxA==
OaM0F9KunPxoQUk/Nw==
needook.com
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 5 IoCs
Processes:
NEWorder2022FILE8876.exevbc.execolorcpl.exedescription pid process target process PID 4976 set thread context of 3968 4976 NEWorder2022FILE8876.exe vbc.exe PID 3968 set thread context of 2600 3968 vbc.exe Explorer.EXE PID 216 set thread context of 2600 216 colorcpl.exe Explorer.EXE PID 216 set thread context of 912 216 colorcpl.exe explorer.exe PID 216 set thread context of 1372 216 colorcpl.exe explorer.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1960 2600 WerFault.exe Explorer.EXE 3132 912 WerFault.exe explorer.exe -
Modifies registry class 9 IoCs
Processes:
explorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2386679933-1492765628-3466841596-1000\{24C773CB-B9FA-4D57-ABEB-87236EBD27B4} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2386679933-1492765628-3466841596-1000\{B9C5383F-A065-4171-886B-C68E67AF47F8} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
vbc.execolorcpl.exepid process 3968 vbc.exe 3968 vbc.exe 3968 vbc.exe 3968 vbc.exe 3968 vbc.exe 3968 vbc.exe 3968 vbc.exe 3968 vbc.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe -
Suspicious behavior: MapViewOfSection 11 IoCs
Processes:
vbc.execolorcpl.exepid process 3968 vbc.exe 3968 vbc.exe 3968 vbc.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe 216 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
Processes:
vbc.execolorcpl.exeExplorer.EXEexplorer.exeexplorer.exedescription pid process Token: SeDebugPrivilege 3968 vbc.exe Token: SeDebugPrivilege 216 colorcpl.exe Token: SeShutdownPrivilege 2600 Explorer.EXE Token: SeCreatePagefilePrivilege 2600 Explorer.EXE Token: SeShutdownPrivilege 912 explorer.exe Token: SeCreatePagefilePrivilege 912 explorer.exe Token: SeShutdownPrivilege 912 explorer.exe Token: SeCreatePagefilePrivilege 912 explorer.exe Token: SeShutdownPrivilege 912 explorer.exe Token: SeCreatePagefilePrivilege 912 explorer.exe Token: SeShutdownPrivilege 912 explorer.exe Token: SeCreatePagefilePrivilege 912 explorer.exe Token: SeShutdownPrivilege 912 explorer.exe Token: SeCreatePagefilePrivilege 912 explorer.exe Token: SeShutdownPrivilege 1372 explorer.exe Token: SeCreatePagefilePrivilege 1372 explorer.exe Token: SeShutdownPrivilege 1372 explorer.exe Token: SeCreatePagefilePrivilege 1372 explorer.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
explorer.exeexplorer.exepid process 912 explorer.exe 912 explorer.exe 912 explorer.exe 912 explorer.exe 912 explorer.exe 912 explorer.exe 912 explorer.exe 1372 explorer.exe 1372 explorer.exe -
Suspicious use of SendNotifyMessage 11 IoCs
Processes:
explorer.exeexplorer.exepid process 912 explorer.exe 912 explorer.exe 912 explorer.exe 912 explorer.exe 912 explorer.exe 912 explorer.exe 912 explorer.exe 912 explorer.exe 912 explorer.exe 1372 explorer.exe 1372 explorer.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
NEWorder2022FILE8876.exeExplorer.EXEdescription pid process target process PID 4976 wrote to memory of 3968 4976 NEWorder2022FILE8876.exe vbc.exe PID 4976 wrote to memory of 3968 4976 NEWorder2022FILE8876.exe vbc.exe PID 4976 wrote to memory of 3968 4976 NEWorder2022FILE8876.exe vbc.exe PID 4976 wrote to memory of 3968 4976 NEWorder2022FILE8876.exe vbc.exe PID 4976 wrote to memory of 3968 4976 NEWorder2022FILE8876.exe vbc.exe PID 4976 wrote to memory of 3968 4976 NEWorder2022FILE8876.exe vbc.exe PID 2600 wrote to memory of 216 2600 Explorer.EXE colorcpl.exe PID 2600 wrote to memory of 216 2600 Explorer.EXE colorcpl.exe PID 2600 wrote to memory of 216 2600 Explorer.EXE colorcpl.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\NEWorder2022FILE8876.exe"C:\Users\Admin\AppData\Local\Temp\NEWorder2022FILE8876.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3968 -
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:216 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2600 -s 44642⤵
- Program crash
PID:1960
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 460 -p 2600 -ip 26001⤵PID:4228
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:912 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 912 -s 29402⤵
- Program crash
PID:3132
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 448 -p 912 -ip 9121⤵PID:3212
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1372
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/216-147-0x0000000000EE0000-0x0000000000F0D000-memory.dmpFilesize
180KB
-
memory/216-150-0x0000000002EB0000-0x0000000002F3F000-memory.dmpFilesize
572KB
-
memory/216-149-0x0000000000EE0000-0x0000000000F0D000-memory.dmpFilesize
180KB
-
memory/216-148-0x0000000003070000-0x00000000033BA000-memory.dmpFilesize
3.3MB
-
memory/216-143-0x0000000000000000-mapping.dmp
-
memory/216-146-0x0000000000F20000-0x0000000000F39000-memory.dmpFilesize
100KB
-
memory/912-154-0x000000000A120000-0x000000000A264000-memory.dmpFilesize
1.3MB
-
memory/912-153-0x000000000A120000-0x000000000A264000-memory.dmpFilesize
1.3MB
-
memory/2600-152-0x00000000081B0000-0x0000000008300000-memory.dmpFilesize
1.3MB
-
memory/2600-151-0x00000000081B0000-0x0000000008300000-memory.dmpFilesize
1.3MB
-
memory/2600-142-0x0000000002E30000-0x0000000002F12000-memory.dmpFilesize
904KB
-
memory/3968-138-0x0000000000401000-0x000000000042E000-memory.dmpFilesize
180KB
-
memory/3968-145-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/3968-144-0x0000000000401000-0x000000000042E000-memory.dmpFilesize
180KB
-
memory/3968-141-0x00000000010D0000-0x00000000010E0000-memory.dmpFilesize
64KB
-
memory/3968-139-0x00000000016C0000-0x0000000001A0A000-memory.dmpFilesize
3.3MB
-
memory/3968-137-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/3968-134-0x00000000004012B0-mapping.dmp
-
memory/3968-133-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/4976-132-0x0000025FB5BC0000-0x0000025FB5C96000-memory.dmpFilesize
856KB
-
memory/4976-136-0x00007FFD8C5D0000-0x00007FFD8D091000-memory.dmpFilesize
10.8MB