Analysis
-
max time kernel
33s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
New Order Confirmation 202311028.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
New Order Confirmation 202311028.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231222-en
General
-
Target
New Order Confirmation 202311028.exe
-
Size
615KB
-
MD5
f044ecbe7061c181c782ad9406113b0b
-
SHA1
f482fe9341d6e040a563ba0f429c165840bb48a0
-
SHA256
5d361031b16736fe2a96b8907d2a33d28e40aca2587f74eb4d92482ce4e68118
-
SHA512
b1762af153a87a9271c2bcaebd5894c336041b8af9b9fa2e1259aeeabfe63221f8d347b72b593d41bf6a1efeb53c856bc322ba0ee8f12faa16bae051d32b9229
-
SSDEEP
12288:wop/kb5q37+1/GygOiDFG+JudHPqd1tm8e7wsR9UOR3D64ho2:wou4/ygOYFG+qid1Y8e7wQ9phm2
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2964 New Order Confirmation 202311028.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Startup key = "C:\\Users\\Admin\\AppData\\Local\\Temp\\subfolder1\\Gaussfilterbredde.exe" wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2964 New Order Confirmation 202311028.exe 2856 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2964 set thread context of 2856 2964 New Order Confirmation 202311028.exe 29 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\filmslide\windowful.lnk New Order Confirmation 202311028.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2964 New Order Confirmation 202311028.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2856 2964 New Order Confirmation 202311028.exe 29 PID 2964 wrote to memory of 2856 2964 New Order Confirmation 202311028.exe 29 PID 2964 wrote to memory of 2856 2964 New Order Confirmation 202311028.exe 29 PID 2964 wrote to memory of 2856 2964 New Order Confirmation 202311028.exe 29 PID 2964 wrote to memory of 2856 2964 New Order Confirmation 202311028.exe 29 PID 2964 wrote to memory of 2856 2964 New Order Confirmation 202311028.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order Confirmation 202311028.exe"C:\Users\Admin\AppData\Local\Temp\New Order Confirmation 202311028.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Users\Admin\AppData\Local\Temp\New Order Confirmation 202311028.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5b2e62fc0cce1922c383a524f8d0e5eac
SHA136ca5cae90e780ba7ac77e65d2aff4ce9294fc3c
SHA256a7945eabd0599f859d466c6a8f2577814c7439429a0ba73d460cebaac79a6f46
SHA512e31eaa48745cc8118ad1126831f6d134e049ce345a49b4de25cd0ebcb2ccf1dc6f3a0138da66233b2f4121dff8b0692cd50a0a7002afcbb053c1984a6f84c82a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1d10e4e1366967277bbdae831ef2143
SHA194f3e78e8490b1ebc4effdaa264fc4674b73e190
SHA2564daec155c9edf727815d346f074af3f5036339edc52e00f0b709cdc828441384
SHA5128409740bc8b311f0d3efeb60059d5c39e228edc32672ffc5d35a64ed0e39bbb526672013c025291c6b30ea63979b279642b3affe817aa4bf51342d36fcbadaef
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
11KB
MD53f176d1ee13b0d7d6bd92e1c7a0b9bae
SHA1fe582246792774c2c9dd15639ffa0aca90d6fd0b
SHA256fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
SHA5120a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6