Analysis
-
max time kernel
51s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 16:38
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20240508-en
General
-
Target
Purchase Order.exe
-
Size
1.1MB
-
MD5
216052c16bf322f2dbe2086605fc534a
-
SHA1
9c4fe84a99dd4447e5dfef778de416cef45abe5a
-
SHA256
6db218707e526a2a6eda9f68d36cc3f71c4d720b205df2aca356b68e3a9a5a35
-
SHA512
ec3104411fa67281484b0f338941f4ac38f198a9d46775826f72ba0e21a49de5efd08d6c21e8a4448a64606f08e42df5946c4f4d84ad1fc7008b868f8325989d
-
SSDEEP
24576:sAHnh+eWsN3skA4RV1Hom2KXMmHazsL7eRT/cC6MdDVRmUh5:Lh+ZkldoPK8Yazce6C6Mdh4q
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2972 set thread context of 4524 2972 Purchase Order.exe 81 -
Program crash 1 IoCs
pid pid_target Process procid_target 632 2972 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4524 svchost.exe 4524 svchost.exe 4524 svchost.exe 4524 svchost.exe 4524 svchost.exe 4524 svchost.exe 4524 svchost.exe 4524 svchost.exe 4524 svchost.exe 4524 svchost.exe 4524 svchost.exe 4524 svchost.exe 4524 svchost.exe 4524 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2972 Purchase Order.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2972 Purchase Order.exe 2972 Purchase Order.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2972 Purchase Order.exe 2972 Purchase Order.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 4524 2972 Purchase Order.exe 81 PID 2972 wrote to memory of 4524 2972 Purchase Order.exe 81 PID 2972 wrote to memory of 4524 2972 Purchase Order.exe 81 PID 2972 wrote to memory of 4524 2972 Purchase Order.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 7282⤵
- Program crash
PID:632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2972 -ip 29721⤵PID:4200
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD592608c0f8ee6b9cb6c77fab74744ccde
SHA1f08dbed0e57f4716c59e2cdbbf2d2ee2f8799097
SHA25656c19c1bf61b65f6647d07e5675b4929d3d59be0e19a5aefd92c0cd43cba8b22
SHA512e8b7231ec157a7f61c4e126e3b46ff69dd70e98e9b98f84c5971cb8b6174b65e8cac2be4781c4aaa973e2ff39be5b1d082c3f9389ae1aef2f5df2d2f7239a922