Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/02/2023, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order List_pdf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Purchase Order List_pdf.exe
Resource
win10v2004-20220812-en
General
-
Target
Purchase Order List_pdf.exe
-
Size
496KB
-
MD5
baddb86647d089bfa0d8df3d4ad530b7
-
SHA1
5cff46b5fbe01167eaa2718ddf43b8c89bc6f297
-
SHA256
9ac3510864002a124f1c7b61f64da4e87c5b944b21afb4677faa639b61a11929
-
SHA512
856a2446e9d1f26cd1e1bd6180a7b73c7b9c4b19a833519280a671af6cb173093e62a9723c359c76715e9c5359c56526e4cd04317d3615e215a3420475950db8
-
SSDEEP
12288:uY3MkVub9G1BHEXfJ8MVP2e8smrr+tAGrK4w:uY36hGcXfJ86JR6+tAb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\International\Geo\Nation fpmald.exe -
Executes dropped EXE 2 IoCs
pid Process 1992 fpmald.exe 1492 fpmald.exe -
Loads dropped DLL 3 IoCs
pid Process 1264 Purchase Order List_pdf.exe 1992 fpmald.exe 588 chkdsk.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1992 set thread context of 1492 1992 fpmald.exe 29 PID 1492 set thread context of 1256 1492 fpmald.exe 16 PID 588 set thread context of 1256 588 chkdsk.exe 16 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
description ioc Process Key created \Registry\User\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1492 fpmald.exe 1492 fpmald.exe 1492 fpmald.exe 1492 fpmald.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1256 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1992 fpmald.exe 1492 fpmald.exe 1492 fpmald.exe 1492 fpmald.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe 588 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1492 fpmald.exe Token: SeDebugPrivilege 588 chkdsk.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1256 Explorer.EXE 1256 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1256 Explorer.EXE 1256 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1992 1264 Purchase Order List_pdf.exe 28 PID 1264 wrote to memory of 1992 1264 Purchase Order List_pdf.exe 28 PID 1264 wrote to memory of 1992 1264 Purchase Order List_pdf.exe 28 PID 1264 wrote to memory of 1992 1264 Purchase Order List_pdf.exe 28 PID 1992 wrote to memory of 1492 1992 fpmald.exe 29 PID 1992 wrote to memory of 1492 1992 fpmald.exe 29 PID 1992 wrote to memory of 1492 1992 fpmald.exe 29 PID 1992 wrote to memory of 1492 1992 fpmald.exe 29 PID 1992 wrote to memory of 1492 1992 fpmald.exe 29 PID 1256 wrote to memory of 588 1256 Explorer.EXE 30 PID 1256 wrote to memory of 588 1256 Explorer.EXE 30 PID 1256 wrote to memory of 588 1256 Explorer.EXE 30 PID 1256 wrote to memory of 588 1256 Explorer.EXE 30 PID 588 wrote to memory of 1268 588 chkdsk.exe 33 PID 588 wrote to memory of 1268 588 chkdsk.exe 33 PID 588 wrote to memory of 1268 588 chkdsk.exe 33 PID 588 wrote to memory of 1268 588 chkdsk.exe 33 PID 588 wrote to memory of 1268 588 chkdsk.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order List_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order List_pdf.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\fpmald.exe"C:\Users\Admin\AppData\Local\Temp\fpmald.exe" C:\Users\Admin\AppData\Local\Temp\qweshnmy.n3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\fpmald.exe"C:\Users\Admin\AppData\Local\Temp\fpmald.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1268
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361KB
MD53904d7960aa23037bff7b2cf2a0a5af0
SHA182470b7cafca0d6cc0b497313ea52c5273dcaac9
SHA256455f8f2fb4afe3b1c46fae8a8518d315444168047bc6b2bef8ed698fb0ccda7d
SHA512b9ccb955cebae1ac1c8a53a9347d222265ff74f11bb4aba62c370eff2423fc802de5d9519547cafe06abae20eb6de8a412ccc7eb6cda23932952c1ef19a2d185
-
Filesize
361KB
MD53904d7960aa23037bff7b2cf2a0a5af0
SHA182470b7cafca0d6cc0b497313ea52c5273dcaac9
SHA256455f8f2fb4afe3b1c46fae8a8518d315444168047bc6b2bef8ed698fb0ccda7d
SHA512b9ccb955cebae1ac1c8a53a9347d222265ff74f11bb4aba62c370eff2423fc802de5d9519547cafe06abae20eb6de8a412ccc7eb6cda23932952c1ef19a2d185
-
Filesize
361KB
MD53904d7960aa23037bff7b2cf2a0a5af0
SHA182470b7cafca0d6cc0b497313ea52c5273dcaac9
SHA256455f8f2fb4afe3b1c46fae8a8518d315444168047bc6b2bef8ed698fb0ccda7d
SHA512b9ccb955cebae1ac1c8a53a9347d222265ff74f11bb4aba62c370eff2423fc802de5d9519547cafe06abae20eb6de8a412ccc7eb6cda23932952c1ef19a2d185
-
Filesize
206KB
MD5dbe307eac41536ed0095066e0346932e
SHA1ffd43df296e22475a37772bd79afcd277d28a473
SHA256dbfeed0da63a42b560d56641d886f29a22ebb0f18d0068222fcfa0245881e808
SHA51221a0d1229e6b17de4e4571b30bd07da75d937633602f67c2cc47e3263f6daa8227c4df728b8a94548be76e9193f42035384985a618c7d4686397eae3f03d68ab
-
Filesize
5KB
MD53a44cb7cf19e2302ed6856d5f53e526b
SHA1097099b815b378d675a19fa41e10ff891bcaae3a
SHA256f18c489b3379b150d20cbd4ba72d734c3b42faf92a6dddf177e16b4a1a865fdc
SHA512f984fa81887db8619a1fb8ce9c68384517c951c792a95761c3be5c58597796294784208a1fef8a24aadf86a36093f538f880bb8e74d3982383b54dbe78b0edef
-
Filesize
361KB
MD53904d7960aa23037bff7b2cf2a0a5af0
SHA182470b7cafca0d6cc0b497313ea52c5273dcaac9
SHA256455f8f2fb4afe3b1c46fae8a8518d315444168047bc6b2bef8ed698fb0ccda7d
SHA512b9ccb955cebae1ac1c8a53a9347d222265ff74f11bb4aba62c370eff2423fc802de5d9519547cafe06abae20eb6de8a412ccc7eb6cda23932952c1ef19a2d185
-
Filesize
361KB
MD53904d7960aa23037bff7b2cf2a0a5af0
SHA182470b7cafca0d6cc0b497313ea52c5273dcaac9
SHA256455f8f2fb4afe3b1c46fae8a8518d315444168047bc6b2bef8ed698fb0ccda7d
SHA512b9ccb955cebae1ac1c8a53a9347d222265ff74f11bb4aba62c370eff2423fc802de5d9519547cafe06abae20eb6de8a412ccc7eb6cda23932952c1ef19a2d185
-
Filesize
922KB
MD5dda1b03a5cd2ca37c96b7daf5e3a8ed7
SHA1c70e5f58e61980d39608f0795879bf012dbbbca2
SHA25679f86c1edbbc69652a03a0f5667b3985bcf1e19f16fa3b8c7934e5b97ab8586d
SHA512bf83648c9b5d6d65b2c8409d262a1b7421d2cb13d6c759ec5f352c2d1c5adff3ee2395250fbdfe3590f25fe96bf6b40c2d82a8e7eecaab03be2e6a398e83981f