Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER.exe
Resource
win7-20231129-en
General
-
Target
NEW ORDER.exe
-
Size
763KB
-
MD5
9df58df76c5826af2a9357287869e0f7
-
SHA1
c2d804fdeefc82563b51c04870b49cc998588712
-
SHA256
6a220dfe065da94494e1f5a94311bdba17f6f56d66f40ca39af817798fea09af
-
SHA512
2f0a90bdf8748d4c616b0568ddbb9043dedbb536a5902cec3e6693ed37ba94fb2aec42c514722f09589d27d5bdb1bbe3c3c4d3338386459348ad695465b9f494
-
SSDEEP
12288:eQDFTPiULBMzvlKXj3Z+ka1XmrpVMSTUplRYgK+CVINEX9yKBg7vjG:HPh2NKXj8tVmpmGUpXYfia9yKe/
Malware Config
Extracted
formbook
4.1
ij84
resetter.xyz
simonbelanger.me
kwip.xyz
7dbb9.baby
notion-everyday.com
saftiwall.com
pulse-gaming.com
fafafa1.shop
ihaveahole.com
sxtzzj.com
996688x.xyz
komalili.monster
haberdashere.store
nurselifegng.com
kidtryz.com
ghvx.xyz
1minvideopro.com
hidef.group
stylishbeststyler.space
spx21.com
spatialad.net
btstarvip.xyz
gofetcher.net
cqcready.net
thecommunitycatalyst.com
ssduckduckgo.com
hastingsmortgagegroup.com
mcminniespostersandmore.com
xn--vaffelppinne-zcb.com
thelsao.com
muddybootssalisbury.com
repetitionlaces.com
yao-med.com
hometotheworldcleaning.com
ampowersolar.com
xn--dtruire-bya.com
cryptofarm.space
ventaonline.site
davidedema.com
forklift-jobs-50425.bond
laserfusionart.com
mundosaludable.club
bndl.fit
lbexpress.shop
matthewbrownlee.com
viega.pro
recrooglobal.com
langzzzblog.online
m-1263bets10.com
surfacespecialistsnc.com
conallnolankitchens.com
80n.icu
bleeckha.us
thyselftrench.com
bawaslu-tual.com
elevatebuilders.co.za
spacekat.xyz
seniorlivinghub.today
aloyoga-southafricas.com
pickstreak.com
boutiquelrdesign.com
nazook.net
ifoxclicks.com
clinicallabpartner.com
budget-harmony.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2752-25-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2752-30-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2752-35-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4512-36-0x0000000000E30000-0x0000000000E5F000-memory.dmp formbook -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GHUI.lnk NEW ORDER.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jui\GHUI.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jui\GHUI.exe cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 4784 GHUI.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4784 set thread context of 2752 4784 GHUI.exe 94 PID 2752 set thread context of 3556 2752 AddInProcess32.exe 56 PID 2752 set thread context of 3556 2752 AddInProcess32.exe 56 PID 4512 set thread context of 3556 4512 help.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2552 PING.EXE 644 PING.EXE -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4392 NEW ORDER.exe 4784 GHUI.exe 4784 GHUI.exe 2752 AddInProcess32.exe 2752 AddInProcess32.exe 2752 AddInProcess32.exe 2752 AddInProcess32.exe 2752 AddInProcess32.exe 2752 AddInProcess32.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe 4512 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2752 AddInProcess32.exe 2752 AddInProcess32.exe 2752 AddInProcess32.exe 2752 AddInProcess32.exe 4512 help.exe 4512 help.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4392 NEW ORDER.exe Token: SeDebugPrivilege 4784 GHUI.exe Token: SeDebugPrivilege 2752 AddInProcess32.exe Token: SeDebugPrivilege 4512 help.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4392 wrote to memory of 3612 4392 NEW ORDER.exe 87 PID 4392 wrote to memory of 3612 4392 NEW ORDER.exe 87 PID 4392 wrote to memory of 3612 4392 NEW ORDER.exe 87 PID 3612 wrote to memory of 644 3612 cmd.exe 89 PID 3612 wrote to memory of 644 3612 cmd.exe 89 PID 3612 wrote to memory of 644 3612 cmd.exe 89 PID 3612 wrote to memory of 2552 3612 cmd.exe 90 PID 3612 wrote to memory of 2552 3612 cmd.exe 90 PID 3612 wrote to memory of 2552 3612 cmd.exe 90 PID 3612 wrote to memory of 4784 3612 cmd.exe 93 PID 3612 wrote to memory of 4784 3612 cmd.exe 93 PID 3612 wrote to memory of 4784 3612 cmd.exe 93 PID 4784 wrote to memory of 2752 4784 GHUI.exe 94 PID 4784 wrote to memory of 2752 4784 GHUI.exe 94 PID 4784 wrote to memory of 2752 4784 GHUI.exe 94 PID 4784 wrote to memory of 2752 4784 GHUI.exe 94 PID 4784 wrote to memory of 2752 4784 GHUI.exe 94 PID 4784 wrote to memory of 2752 4784 GHUI.exe 94 PID 3556 wrote to memory of 4512 3556 Explorer.EXE 101 PID 3556 wrote to memory of 4512 3556 Explorer.EXE 101 PID 3556 wrote to memory of 4512 3556 Explorer.EXE 101 PID 4512 wrote to memory of 2896 4512 help.exe 102 PID 4512 wrote to memory of 2896 4512 help.exe 102 PID 4512 wrote to memory of 2896 4512 help.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\NEW ORDER.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER.exe"2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 15 > nul && copy "C:\Users\Admin\AppData\Local\Temp\NEW ORDER.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jui\GHUI.exe" && ping 127.0.0.1 -n 15 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jui\GHUI.exe"3⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 154⤵
- Runs ping.exe
PID:644
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 154⤵
- Runs ping.exe
PID:2552
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jui\GHUI.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jui\GHUI.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1216
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3236
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:4588
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2604
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:4852
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵PID:2896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
763KB
MD59df58df76c5826af2a9357287869e0f7
SHA1c2d804fdeefc82563b51c04870b49cc998588712
SHA2566a220dfe065da94494e1f5a94311bdba17f6f56d66f40ca39af817798fea09af
SHA5122f0a90bdf8748d4c616b0568ddbb9043dedbb536a5902cec3e6693ed37ba94fb2aec42c514722f09589d27d5bdb1bbe3c3c4d3338386459348ad695465b9f494