Analysis
-
max time kernel
91s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2023 10:13
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20220901-en
General
-
Target
Purchase Order.exe
-
Size
615KB
-
MD5
ec15ab6bec865de98d39f4ab8e73fe1b
-
SHA1
95e0fb211f31673dd6f9f4e74360b184250d3fde
-
SHA256
f56c8e197bbe551942b7e01808646b1ccbb01e8d43fc2ba3e5a6017e40e8e1d4
-
SHA512
04efb4548509befdcf4a0dd5e61a9e46d9313aeae82f9779d7e2edae8f2f42f058945cf89871f382f1e1b96f065a07e3189a7edd039eb53a7640fe7afd8ccc82
-
SSDEEP
12288:OmCglZ6MneQ8/aR/O11EqQNIAW8FzQS/dlf2XwE7jo9av/Ksq/Ks6/Ks:tRKAKihcYNrWKQkddW/3OOiS
Malware Config
Signatures
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
jsc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Purchase Order.exedescription pid process target process PID 4996 set thread context of 3268 4996 Purchase Order.exe jsc.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
Purchase Order.exepid process 4996 Purchase Order.exe 4996 Purchase Order.exe 4996 Purchase Order.exe 4996 Purchase Order.exe 4996 Purchase Order.exe 4996 Purchase Order.exe 4996 Purchase Order.exe 4996 Purchase Order.exe 4996 Purchase Order.exe 4996 Purchase Order.exe 4996 Purchase Order.exe 4996 Purchase Order.exe 4996 Purchase Order.exe 4996 Purchase Order.exe 4996 Purchase Order.exe 4996 Purchase Order.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Purchase Order.exejsc.exedescription pid process Token: SeDebugPrivilege 4996 Purchase Order.exe Token: SeDebugPrivilege 3268 jsc.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
Purchase Order.exedescription pid process target process PID 4996 wrote to memory of 4792 4996 Purchase Order.exe aspnet_regiis.exe PID 4996 wrote to memory of 4792 4996 Purchase Order.exe aspnet_regiis.exe PID 4996 wrote to memory of 536 4996 Purchase Order.exe RegSvcs.exe PID 4996 wrote to memory of 536 4996 Purchase Order.exe RegSvcs.exe PID 4996 wrote to memory of 4092 4996 Purchase Order.exe aspnet_state.exe PID 4996 wrote to memory of 4092 4996 Purchase Order.exe aspnet_state.exe PID 4996 wrote to memory of 1260 4996 Purchase Order.exe InstallUtil.exe PID 4996 wrote to memory of 1260 4996 Purchase Order.exe InstallUtil.exe PID 4996 wrote to memory of 4652 4996 Purchase Order.exe ngen.exe PID 4996 wrote to memory of 4652 4996 Purchase Order.exe ngen.exe PID 4996 wrote to memory of 540 4996 Purchase Order.exe csc.exe PID 4996 wrote to memory of 540 4996 Purchase Order.exe csc.exe PID 4996 wrote to memory of 2724 4996 Purchase Order.exe CasPol.exe PID 4996 wrote to memory of 2724 4996 Purchase Order.exe CasPol.exe PID 4996 wrote to memory of 1152 4996 Purchase Order.exe ilasm.exe PID 4996 wrote to memory of 1152 4996 Purchase Order.exe ilasm.exe PID 4996 wrote to memory of 3268 4996 Purchase Order.exe jsc.exe PID 4996 wrote to memory of 3268 4996 Purchase Order.exe jsc.exe PID 4996 wrote to memory of 3268 4996 Purchase Order.exe jsc.exe PID 4996 wrote to memory of 3268 4996 Purchase Order.exe jsc.exe PID 4996 wrote to memory of 3268 4996 Purchase Order.exe jsc.exe PID 4996 wrote to memory of 3268 4996 Purchase Order.exe jsc.exe PID 4996 wrote to memory of 3268 4996 Purchase Order.exe jsc.exe PID 4996 wrote to memory of 3268 4996 Purchase Order.exe jsc.exe -
outlook_office_path 1 IoCs
Processes:
jsc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe -
outlook_win_path 1 IoCs
Processes:
jsc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3268-133-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3268-134-0x000000000042A62E-mapping.dmp
-
memory/3268-137-0x0000000005420000-0x00000000059C4000-memory.dmpFilesize
5.6MB
-
memory/3268-138-0x0000000004EE0000-0x0000000004F46000-memory.dmpFilesize
408KB
-
memory/3268-139-0x0000000006000000-0x0000000006092000-memory.dmpFilesize
584KB
-
memory/3268-140-0x0000000005FF0000-0x0000000005FFA000-memory.dmpFilesize
40KB
-
memory/3268-141-0x0000000006230000-0x0000000006280000-memory.dmpFilesize
320KB
-
memory/3268-142-0x0000000006450000-0x0000000006612000-memory.dmpFilesize
1.8MB
-
memory/4996-132-0x00000237A7510000-0x00000237A75AE000-memory.dmpFilesize
632KB
-
memory/4996-135-0x00007FFD51160000-0x00007FFD51C21000-memory.dmpFilesize
10.8MB
-
memory/4996-136-0x00007FFD51160000-0x00007FFD51C21000-memory.dmpFilesize
10.8MB