Analysis
-
max time kernel
142s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04-07-2023 06:08
Static task
static1
Behavioral task
behavioral1
Sample
KIEFEL Packaging GmbH Purchase Order.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
KIEFEL Packaging GmbH Purchase Order.exe
Resource
win10v2004-20230703-en
General
-
Target
KIEFEL Packaging GmbH Purchase Order.exe
-
Size
256KB
-
MD5
cfae6fe1ecccc5a4707ca3a12dbf880f
-
SHA1
669b2f2923070af128a67081deb703d9154588cc
-
SHA256
5a65fc8087d39879abd9c17bbb3581a3d8e57595cc2fff526743aa95e660a59d
-
SHA512
d86289ef4f67644f46f8d7c8a3c2fc4b8d40851d609e44e30822a45c5ce0de5e1d45584553815a93f0a2157cf5a8febc7c71e72b0e77113ee40ddd41e1d2165c
-
SSDEEP
6144:vYa6rh8b1Cs1XkCKkRzaNmmpLPRf2VeGE7KHz:vYBhC1XkLk90mmtWeBKHz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Control Panel\International\Geo\Nation KIEFEL Packaging GmbH Purchase Order.exe -
Loads dropped DLL 1 IoCs
pid Process 1240 KIEFEL Packaging GmbH Purchase Order.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Run\tpyuenjscxhc = "C:\\Users\\Admin\\AppData\\Roaming\\wplueajfoxtdm\\hqmvfbk.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\KIEFEL Packaging GmbH Purchase Order.e" KIEFEL Packaging GmbH Purchase Order.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1240 set thread context of 2052 1240 KIEFEL Packaging GmbH Purchase Order.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe 2052 KIEFEL Packaging GmbH Purchase Order.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1240 KIEFEL Packaging GmbH Purchase Order.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2052 KIEFEL Packaging GmbH Purchase Order.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2052 1240 KIEFEL Packaging GmbH Purchase Order.exe 28 PID 1240 wrote to memory of 2052 1240 KIEFEL Packaging GmbH Purchase Order.exe 28 PID 1240 wrote to memory of 2052 1240 KIEFEL Packaging GmbH Purchase Order.exe 28 PID 1240 wrote to memory of 2052 1240 KIEFEL Packaging GmbH Purchase Order.exe 28 PID 1240 wrote to memory of 2052 1240 KIEFEL Packaging GmbH Purchase Order.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\KIEFEL Packaging GmbH Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\KIEFEL Packaging GmbH Purchase Order.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\KIEFEL Packaging GmbH Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\KIEFEL Packaging GmbH Purchase Order.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD58919071933c463f841fda6706677d331
SHA11d4647ec1dd0d92a0202d1f55a9dddac1d3192fe
SHA25642d14db2f921934b90e3112d9fd2b4db84af8459573d6468334133b158308230
SHA51205237422e3a90c7670275e799fcc69e4afa23bd8ed80f9f2ca152be290ca910602b1dd09c80255f80cbe217af55fae22844eada4b2d24287c9df46f4a1ceba0e