Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/05/2024, 12:43

General

  • Target

    NEW ORDER.exe

  • Size

    1.1MB

  • MD5

    c195ac37aab01def078b838c7dd5fb66

  • SHA1

    231b469cc575c1923ee1f9602cba4aabfea40444

  • SHA256

    a9f3e1e126a84047b71a7d800040226d1037f058a73eaf75a1236ae5f9aa0e2c

  • SHA512

    1ec8c467ee4e0aa94e67fe0baaad9073b6635a36850097a0ac65641c20bad0e5ccc4c5eb88eb3ac7216b06dfa70b24175acd9fcec864c164fee2c7a19fcde74f

  • SSDEEP

    24576:RAHnh+eWsN3skA4RV1Hom2KXMmHaZpQwQFIBHyOOs3PY5:oh+ZkldoPK8YaZpQwQFOO8W

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3436
    • C:\Users\Admin\AppData\Local\Temp\NEW ORDER.exe
      "C:\Users\Admin\AppData\Local\Temp\NEW ORDER.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\NEW ORDER.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:4476
    • C:\Windows\SysWOW64\certreq.exe
      "C:\Windows\SysWOW64\certreq.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:5056
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:644

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\aut470B.tmp

            Filesize

            263KB

            MD5

            24a6eb78510b2da1a62fcdc7adc8a3c1

            SHA1

            34ac6f3cba4d017ac0861a50a06f7b65cc512158

            SHA256

            e9ba5cc956d243685bd9611025df845b5bb5531cd06f65873b9ba9a762b609d2

            SHA512

            6862e29ee2905421bbe57dbcb24b99ff3e1163e55262b57931d91bc31928b0b3ba008766ac9dcb8daa4738d6edc3e6c8de54d4d7e80e841d7271349386b03dc1

          • memory/644-37-0x000001A430B30000-0x000001A430BD9000-memory.dmp

            Filesize

            676KB

          • memory/3032-12-0x00000000020B0000-0x00000000020B4000-memory.dmp

            Filesize

            16KB

          • memory/3436-19-0x000000000D270000-0x000000000E5C0000-memory.dmp

            Filesize

            19.3MB

          • memory/3436-29-0x0000000002B10000-0x0000000002BD5000-memory.dmp

            Filesize

            788KB

          • memory/3436-30-0x0000000002B10000-0x0000000002BD5000-memory.dmp

            Filesize

            788KB

          • memory/3436-27-0x000000000D270000-0x000000000E5C0000-memory.dmp

            Filesize

            19.3MB

          • memory/3436-38-0x0000000002B10000-0x0000000002BD5000-memory.dmp

            Filesize

            788KB

          • memory/4476-15-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/4476-18-0x00000000013A0000-0x00000000013C1000-memory.dmp

            Filesize

            132KB

          • memory/4476-17-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/4476-23-0x00000000013A0000-0x00000000013C1000-memory.dmp

            Filesize

            132KB

          • memory/4476-22-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/4476-16-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/4476-14-0x0000000001500000-0x000000000184A000-memory.dmp

            Filesize

            3.3MB

          • memory/4476-13-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/5056-21-0x0000000000DB0000-0x0000000000DEF000-memory.dmp

            Filesize

            252KB

          • memory/5056-28-0x0000000000DB0000-0x0000000000DEF000-memory.dmp

            Filesize

            252KB

          • memory/5056-26-0x0000000003160000-0x0000000003200000-memory.dmp

            Filesize

            640KB

          • memory/5056-25-0x0000000000DB0000-0x0000000000DEF000-memory.dmp

            Filesize

            252KB

          • memory/5056-24-0x00000000032A0000-0x00000000035EA000-memory.dmp

            Filesize

            3.3MB

          • memory/5056-20-0x0000000000DB0000-0x0000000000DEF000-memory.dmp

            Filesize

            252KB