Analysis
-
max time kernel
164s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
08/02/2023, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order.exe
Resource
win7-20220812-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
Purchase order.exe
Resource
win10v2004-20221111-en
9 signatures
150 seconds
General
-
Target
Purchase order.exe
-
Size
999KB
-
MD5
8b86d7ad6a13d66a9263717b18fa245a
-
SHA1
58d6abd4cdf878a0931e6d63dd870bf73110cd76
-
SHA256
215948dfb7ffb349f7d3f0ed5ebdd3517d530c8c14833c62bf0152e8a31811a3
-
SHA512
46391ed81e96b737a92fc75bb62f881516dba2d13ea86f376e30e6b574ffd47ec3d6cb597c7e603d87fa50fd9b3aa5cc63aaaeca142db6f095389c7533d4c77d
-
SSDEEP
24576:51rgWuuJ/Gmz4ai4z3avWBdwwrkEPQSiLDi9:5uuJ/sai4zqvWBdtr94SgO
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation Purchase order.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3260 set thread context of 3188 3260 Purchase order.exe 82 PID 3188 set thread context of 700 3188 Purchase order.exe 57 PID 3652 set thread context of 700 3652 NETSTAT.EXE 57 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3652 NETSTAT.EXE -
description ioc Process Key created \Registry\User\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 3188 Purchase order.exe 3188 Purchase order.exe 3188 Purchase order.exe 3188 Purchase order.exe 3188 Purchase order.exe 3188 Purchase order.exe 3188 Purchase order.exe 3188 Purchase order.exe 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 700 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3188 Purchase order.exe 3188 Purchase order.exe 3188 Purchase order.exe 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE 3652 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3188 Purchase order.exe Token: SeDebugPrivilege 3652 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3260 wrote to memory of 3188 3260 Purchase order.exe 82 PID 3260 wrote to memory of 3188 3260 Purchase order.exe 82 PID 3260 wrote to memory of 3188 3260 Purchase order.exe 82 PID 3260 wrote to memory of 3188 3260 Purchase order.exe 82 PID 3260 wrote to memory of 3188 3260 Purchase order.exe 82 PID 3260 wrote to memory of 3188 3260 Purchase order.exe 82 PID 700 wrote to memory of 3652 700 Explorer.EXE 83 PID 700 wrote to memory of 3652 700 Explorer.EXE 83 PID 700 wrote to memory of 3652 700 Explorer.EXE 83 PID 3652 wrote to memory of 4028 3652 NETSTAT.EXE 87 PID 3652 wrote to memory of 4028 3652 NETSTAT.EXE 87 PID 3652 wrote to memory of 4028 3652 NETSTAT.EXE 87
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"{path}"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4028
-
-