Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/02/2023, 17:18

General

  • Target

    Purchase Order List_pdf.exe

  • Size

    496KB

  • MD5

    baddb86647d089bfa0d8df3d4ad530b7

  • SHA1

    5cff46b5fbe01167eaa2718ddf43b8c89bc6f297

  • SHA256

    9ac3510864002a124f1c7b61f64da4e87c5b944b21afb4677faa639b61a11929

  • SHA512

    856a2446e9d1f26cd1e1bd6180a7b73c7b9c4b19a833519280a671af6cb173093e62a9723c359c76715e9c5359c56526e4cd04317d3615e215a3420475950db8

  • SSDEEP

    12288:uY3MkVub9G1BHEXfJ8MVP2e8smrr+tAGrK4w:uY36hGcXfJ86JR6+tAb

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\Purchase Order List_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase Order List_pdf.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1264
      • C:\Users\Admin\AppData\Local\Temp\fpmald.exe
        "C:\Users\Admin\AppData\Local\Temp\fpmald.exe" C:\Users\Admin\AppData\Local\Temp\qweshnmy.n
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1992
        • C:\Users\Admin\AppData\Local\Temp\fpmald.exe
          "C:\Users\Admin\AppData\Local\Temp\fpmald.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1492
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:588
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1268

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\fpmald.exe

      Filesize

      361KB

      MD5

      3904d7960aa23037bff7b2cf2a0a5af0

      SHA1

      82470b7cafca0d6cc0b497313ea52c5273dcaac9

      SHA256

      455f8f2fb4afe3b1c46fae8a8518d315444168047bc6b2bef8ed698fb0ccda7d

      SHA512

      b9ccb955cebae1ac1c8a53a9347d222265ff74f11bb4aba62c370eff2423fc802de5d9519547cafe06abae20eb6de8a412ccc7eb6cda23932952c1ef19a2d185

    • C:\Users\Admin\AppData\Local\Temp\fpmald.exe

      Filesize

      361KB

      MD5

      3904d7960aa23037bff7b2cf2a0a5af0

      SHA1

      82470b7cafca0d6cc0b497313ea52c5273dcaac9

      SHA256

      455f8f2fb4afe3b1c46fae8a8518d315444168047bc6b2bef8ed698fb0ccda7d

      SHA512

      b9ccb955cebae1ac1c8a53a9347d222265ff74f11bb4aba62c370eff2423fc802de5d9519547cafe06abae20eb6de8a412ccc7eb6cda23932952c1ef19a2d185

    • C:\Users\Admin\AppData\Local\Temp\fpmald.exe

      Filesize

      361KB

      MD5

      3904d7960aa23037bff7b2cf2a0a5af0

      SHA1

      82470b7cafca0d6cc0b497313ea52c5273dcaac9

      SHA256

      455f8f2fb4afe3b1c46fae8a8518d315444168047bc6b2bef8ed698fb0ccda7d

      SHA512

      b9ccb955cebae1ac1c8a53a9347d222265ff74f11bb4aba62c370eff2423fc802de5d9519547cafe06abae20eb6de8a412ccc7eb6cda23932952c1ef19a2d185

    • C:\Users\Admin\AppData\Local\Temp\nkphyj.gz

      Filesize

      206KB

      MD5

      dbe307eac41536ed0095066e0346932e

      SHA1

      ffd43df296e22475a37772bd79afcd277d28a473

      SHA256

      dbfeed0da63a42b560d56641d886f29a22ebb0f18d0068222fcfa0245881e808

      SHA512

      21a0d1229e6b17de4e4571b30bd07da75d937633602f67c2cc47e3263f6daa8227c4df728b8a94548be76e9193f42035384985a618c7d4686397eae3f03d68ab

    • C:\Users\Admin\AppData\Local\Temp\qweshnmy.n

      Filesize

      5KB

      MD5

      3a44cb7cf19e2302ed6856d5f53e526b

      SHA1

      097099b815b378d675a19fa41e10ff891bcaae3a

      SHA256

      f18c489b3379b150d20cbd4ba72d734c3b42faf92a6dddf177e16b4a1a865fdc

      SHA512

      f984fa81887db8619a1fb8ce9c68384517c951c792a95761c3be5c58597796294784208a1fef8a24aadf86a36093f538f880bb8e74d3982383b54dbe78b0edef

    • \Users\Admin\AppData\Local\Temp\fpmald.exe

      Filesize

      361KB

      MD5

      3904d7960aa23037bff7b2cf2a0a5af0

      SHA1

      82470b7cafca0d6cc0b497313ea52c5273dcaac9

      SHA256

      455f8f2fb4afe3b1c46fae8a8518d315444168047bc6b2bef8ed698fb0ccda7d

      SHA512

      b9ccb955cebae1ac1c8a53a9347d222265ff74f11bb4aba62c370eff2423fc802de5d9519547cafe06abae20eb6de8a412ccc7eb6cda23932952c1ef19a2d185

    • \Users\Admin\AppData\Local\Temp\fpmald.exe

      Filesize

      361KB

      MD5

      3904d7960aa23037bff7b2cf2a0a5af0

      SHA1

      82470b7cafca0d6cc0b497313ea52c5273dcaac9

      SHA256

      455f8f2fb4afe3b1c46fae8a8518d315444168047bc6b2bef8ed698fb0ccda7d

      SHA512

      b9ccb955cebae1ac1c8a53a9347d222265ff74f11bb4aba62c370eff2423fc802de5d9519547cafe06abae20eb6de8a412ccc7eb6cda23932952c1ef19a2d185

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      922KB

      MD5

      dda1b03a5cd2ca37c96b7daf5e3a8ed7

      SHA1

      c70e5f58e61980d39608f0795879bf012dbbbca2

      SHA256

      79f86c1edbbc69652a03a0f5667b3985bcf1e19f16fa3b8c7934e5b97ab8586d

      SHA512

      bf83648c9b5d6d65b2c8409d262a1b7421d2cb13d6c759ec5f352c2d1c5adff3ee2395250fbdfe3590f25fe96bf6b40c2d82a8e7eecaab03be2e6a398e83981f

    • memory/588-72-0x0000000000990000-0x0000000000A1F000-memory.dmp

      Filesize

      572KB

    • memory/588-74-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/588-71-0x00000000021D0000-0x00000000024D3000-memory.dmp

      Filesize

      3.0MB

    • memory/588-70-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/588-69-0x0000000000DC0000-0x0000000000DC7000-memory.dmp

      Filesize

      28KB

    • memory/1256-67-0x0000000004C70000-0x0000000004D58000-memory.dmp

      Filesize

      928KB

    • memory/1256-73-0x0000000004D60000-0x0000000004E3E000-memory.dmp

      Filesize

      888KB

    • memory/1256-76-0x0000000004D60000-0x0000000004E3E000-memory.dmp

      Filesize

      888KB

    • memory/1256-77-0x000007FEF5F60000-0x000007FEF60A3000-memory.dmp

      Filesize

      1.3MB

    • memory/1256-78-0x000007FE9B4B0000-0x000007FE9B4BA000-memory.dmp

      Filesize

      40KB

    • memory/1264-54-0x0000000075A31000-0x0000000075A33000-memory.dmp

      Filesize

      8KB

    • memory/1492-66-0x0000000000120000-0x0000000000130000-memory.dmp

      Filesize

      64KB

    • memory/1492-65-0x0000000000B00000-0x0000000000E03000-memory.dmp

      Filesize

      3.0MB

    • memory/1492-64-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB