Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08/02/2023, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Purchase order.exe
Resource
win10v2004-20221111-en
General
-
Target
Purchase order.exe
-
Size
999KB
-
MD5
8b86d7ad6a13d66a9263717b18fa245a
-
SHA1
58d6abd4cdf878a0931e6d63dd870bf73110cd76
-
SHA256
215948dfb7ffb349f7d3f0ed5ebdd3517d530c8c14833c62bf0152e8a31811a3
-
SHA512
46391ed81e96b737a92fc75bb62f881516dba2d13ea86f376e30e6b574ffd47ec3d6cb597c7e603d87fa50fd9b3aa5cc63aaaeca142db6f095389c7533d4c77d
-
SSDEEP
24576:51rgWuuJ/Gmz4ai4z3avWBdwwrkEPQSiLDi9:5uuJ/sai4zqvWBdtr94SgO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation Purchase order.exe -
Loads dropped DLL 1 IoCs
pid Process 980 cmmon32.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1112 set thread context of 1788 1112 Purchase order.exe 30 PID 1788 set thread context of 1284 1788 Purchase order.exe 9 PID 980 set thread context of 1284 980 cmmon32.exe 9 -
description ioc Process Key created \Registry\User\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmmon32.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1112 Purchase order.exe 1112 Purchase order.exe 1788 Purchase order.exe 1788 Purchase order.exe 1788 Purchase order.exe 1788 Purchase order.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1788 Purchase order.exe 1788 Purchase order.exe 1788 Purchase order.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe 980 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1112 Purchase order.exe Token: SeDebugPrivilege 1788 Purchase order.exe Token: SeDebugPrivilege 980 cmmon32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1284 Explorer.EXE 1284 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1284 Explorer.EXE 1284 Explorer.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1112 wrote to memory of 1280 1112 Purchase order.exe 28 PID 1112 wrote to memory of 1280 1112 Purchase order.exe 28 PID 1112 wrote to memory of 1280 1112 Purchase order.exe 28 PID 1112 wrote to memory of 1280 1112 Purchase order.exe 28 PID 1112 wrote to memory of 1768 1112 Purchase order.exe 29 PID 1112 wrote to memory of 1768 1112 Purchase order.exe 29 PID 1112 wrote to memory of 1768 1112 Purchase order.exe 29 PID 1112 wrote to memory of 1768 1112 Purchase order.exe 29 PID 1112 wrote to memory of 1788 1112 Purchase order.exe 30 PID 1112 wrote to memory of 1788 1112 Purchase order.exe 30 PID 1112 wrote to memory of 1788 1112 Purchase order.exe 30 PID 1112 wrote to memory of 1788 1112 Purchase order.exe 30 PID 1112 wrote to memory of 1788 1112 Purchase order.exe 30 PID 1112 wrote to memory of 1788 1112 Purchase order.exe 30 PID 1112 wrote to memory of 1788 1112 Purchase order.exe 30 PID 1284 wrote to memory of 980 1284 Explorer.EXE 31 PID 1284 wrote to memory of 980 1284 Explorer.EXE 31 PID 1284 wrote to memory of 980 1284 Explorer.EXE 31 PID 1284 wrote to memory of 980 1284 Explorer.EXE 31 PID 980 wrote to memory of 1084 980 cmmon32.exe 34 PID 980 wrote to memory of 1084 980 cmmon32.exe 34 PID 980 wrote to memory of 1084 980 cmmon32.exe 34 PID 980 wrote to memory of 1084 980 cmmon32.exe 34 PID 980 wrote to memory of 1084 980 cmmon32.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"{path}"3⤵PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"{path}"3⤵PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"{path}"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1084
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
831KB
MD5f4d8be409d1bd016a7b3b2580a2b90fb
SHA1a68e1f6a9b2234f2269d9cf1fbda94124c428dbe
SHA256d70b27121bb33012560b14a7bd597666d76193d7dc5f89e2ac5e7507240bf708
SHA5129892cd38d77898fe7916a8810c82a377bbcb4f0c3f75a8295943fa29a5cb4daec95a1600a74614f31ec723967fd95721174042f2e54b12e52fe85202cdf052df