Analysis
-
max time kernel
49s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16-04-2023 11:42
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20230221-en
windows10-2004-x64
21 signatures
150 seconds
General
-
Target
Purchase Order.exe
-
Size
1.3MB
-
MD5
293fdf1a86054e7f7ea5468093a32619
-
SHA1
556f35a6bc2f99c18eac6efc24772bcaea2c4dc7
-
SHA256
9966abd2f2239c4ab9ef470ba0a76c3546645666976c45d7294214d283510140
-
SHA512
dd89c55471e4573b14bc8b15fd5f268bc03f6c47d127bb3a07f70b3ff7ecf6c43f86eae13a2bf70d15baf9df2de198cbb5a18b287dff08027a7dbbb51d6d94df
-
SSDEEP
24576:dlDz26SjmWjOMnxBZL/gBDTOihq+6yYAJOxyaLYJydD4noK1kY2OdGJ306n2r6L:bDcmWKMx7L/oHOihz6y9JOx2Ig162OL
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1536 Purchase Order.exe 1536 Purchase Order.exe 1536 Purchase Order.exe 1536 Purchase Order.exe 1536 Purchase Order.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1536 Purchase Order.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1536 wrote to memory of 1152 1536 Purchase Order.exe 27 PID 1536 wrote to memory of 1152 1536 Purchase Order.exe 27 PID 1536 wrote to memory of 1152 1536 Purchase Order.exe 27 PID 1536 wrote to memory of 1152 1536 Purchase Order.exe 27 PID 1536 wrote to memory of 1660 1536 Purchase Order.exe 28 PID 1536 wrote to memory of 1660 1536 Purchase Order.exe 28 PID 1536 wrote to memory of 1660 1536 Purchase Order.exe 28 PID 1536 wrote to memory of 1660 1536 Purchase Order.exe 28 PID 1536 wrote to memory of 520 1536 Purchase Order.exe 29 PID 1536 wrote to memory of 520 1536 Purchase Order.exe 29 PID 1536 wrote to memory of 520 1536 Purchase Order.exe 29 PID 1536 wrote to memory of 520 1536 Purchase Order.exe 29 PID 1536 wrote to memory of 468 1536 Purchase Order.exe 30 PID 1536 wrote to memory of 468 1536 Purchase Order.exe 30 PID 1536 wrote to memory of 468 1536 Purchase Order.exe 30 PID 1536 wrote to memory of 468 1536 Purchase Order.exe 30 PID 1536 wrote to memory of 696 1536 Purchase Order.exe 31 PID 1536 wrote to memory of 696 1536 Purchase Order.exe 31 PID 1536 wrote to memory of 696 1536 Purchase Order.exe 31 PID 1536 wrote to memory of 696 1536 Purchase Order.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"2⤵PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"2⤵PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"2⤵PID:520
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"2⤵PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"2⤵PID:696
-