Analysis

  • max time kernel
    142s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2023 06:08

General

  • Target

    KIEFEL Packaging GmbH Purchase Order.exe

  • Size

    256KB

  • MD5

    cfae6fe1ecccc5a4707ca3a12dbf880f

  • SHA1

    669b2f2923070af128a67081deb703d9154588cc

  • SHA256

    5a65fc8087d39879abd9c17bbb3581a3d8e57595cc2fff526743aa95e660a59d

  • SHA512

    d86289ef4f67644f46f8d7c8a3c2fc4b8d40851d609e44e30822a45c5ce0de5e1d45584553815a93f0a2157cf5a8febc7c71e72b0e77113ee40ddd41e1d2165c

  • SSDEEP

    6144:vYa6rh8b1Cs1XkCKkRzaNmmpLPRf2VeGE7KHz:vYBhC1XkLk90mmtWeBKHz

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KIEFEL Packaging GmbH Purchase Order.exe
    "C:\Users\Admin\AppData\Local\Temp\KIEFEL Packaging GmbH Purchase Order.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\KIEFEL Packaging GmbH Purchase Order.exe
      "C:\Users\Admin\AppData\Local\Temp\KIEFEL Packaging GmbH Purchase Order.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2052

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsj2B19.tmp\zxsot.dll

    Filesize

    6KB

    MD5

    8919071933c463f841fda6706677d331

    SHA1

    1d4647ec1dd0d92a0202d1f55a9dddac1d3192fe

    SHA256

    42d14db2f921934b90e3112d9fd2b4db84af8459573d6468334133b158308230

    SHA512

    05237422e3a90c7670275e799fcc69e4afa23bd8ed80f9f2ca152be290ca910602b1dd09c80255f80cbe217af55fae22844eada4b2d24287c9df46f4a1ceba0e

  • memory/2052-62-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2052-63-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2052-64-0x0000000000730000-0x0000000000A33000-memory.dmp

    Filesize

    3.0MB

  • memory/2052-65-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB