Analysis

  • max time kernel
    164s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/02/2023, 17:28

General

  • Target

    Purchase order.exe

  • Size

    999KB

  • MD5

    8b86d7ad6a13d66a9263717b18fa245a

  • SHA1

    58d6abd4cdf878a0931e6d63dd870bf73110cd76

  • SHA256

    215948dfb7ffb349f7d3f0ed5ebdd3517d530c8c14833c62bf0152e8a31811a3

  • SHA512

    46391ed81e96b737a92fc75bb62f881516dba2d13ea86f376e30e6b574ffd47ec3d6cb597c7e603d87fa50fd9b3aa5cc63aaaeca142db6f095389c7533d4c77d

  • SSDEEP

    24576:51rgWuuJ/Gmz4ai4z3avWBdwwrkEPQSiLDi9:5uuJ/sai4zqvWBdtr94SgO

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:700
    • C:\Users\Admin\AppData\Local\Temp\Purchase order.exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3260
      • C:\Users\Admin\AppData\Local\Temp\Purchase order.exe
        "{path}"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3188
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3652
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:4028

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/700-151-0x0000000003050000-0x0000000003112000-memory.dmp

      Filesize

      776KB

    • memory/700-150-0x0000000003050000-0x0000000003112000-memory.dmp

      Filesize

      776KB

    • memory/700-144-0x0000000002CD0000-0x0000000002DB9000-memory.dmp

      Filesize

      932KB

    • memory/3188-142-0x0000000001150000-0x000000000149A000-memory.dmp

      Filesize

      3.3MB

    • memory/3188-143-0x0000000000B70000-0x0000000000B80000-memory.dmp

      Filesize

      64KB

    • memory/3188-139-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3188-140-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3188-141-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3260-137-0x0000000004E00000-0x0000000004E0A000-memory.dmp

      Filesize

      40KB

    • memory/3260-133-0x0000000000370000-0x0000000000470000-memory.dmp

      Filesize

      1024KB

    • memory/3260-136-0x0000000004F60000-0x0000000004FFC000-memory.dmp

      Filesize

      624KB

    • memory/3260-135-0x0000000004EC0000-0x0000000004F52000-memory.dmp

      Filesize

      584KB

    • memory/3260-134-0x0000000005470000-0x0000000005A14000-memory.dmp

      Filesize

      5.6MB

    • memory/3652-146-0x00000000000C0000-0x00000000000CB000-memory.dmp

      Filesize

      44KB

    • memory/3652-147-0x0000000000910000-0x000000000093D000-memory.dmp

      Filesize

      180KB

    • memory/3652-148-0x0000000001390000-0x00000000016DA000-memory.dmp

      Filesize

      3.3MB

    • memory/3652-149-0x0000000001200000-0x000000000128F000-memory.dmp

      Filesize

      572KB