Analysis
-
max time kernel
92s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2024 20:39
Static task
static1
Behavioral task
behavioral1
Sample
Order 54409880043.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Order 54409880043.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
215bk9gx2i8m.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
215bk9gx2i8m.dll
Resource
win10v2004-20240730-en
General
-
Target
Order 54409880043.exe
-
Size
288KB
-
MD5
87f3204605783b5198fbaeada397a16b
-
SHA1
60344bb072a9825cda08b0335c3874986b907353
-
SHA256
1382bae50eece1846b8d858d0f975b900eb1a5908f789333c55b1341b1b0d57b
-
SHA512
bfddf86d1ca3fb0c499e6ea4657e1711c4a7a1803728729f60b52573152255a02d62d4a8d0d84b05481bd0e2573f541c37d25a0b5cbf58c181131d941065fe0b
-
SSDEEP
3072:QBkfJpRXATwMdFCceYx5itL1f11Wz0M2U8RTBJNChHBKBULaAnb0J+pERJ6dLA/W:QqjIaK4ZUKHxEaOyl9zKj7icn7Xt
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
Order 54409880043.exepid Process 2320 Order 54409880043.exe 2320 Order 54409880043.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 3748 2320 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Order 54409880043.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order 54409880043.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
Order 54409880043.exepid Process 2320 Order 54409880043.exe 2320 Order 54409880043.exe 2320 Order 54409880043.exe 2320 Order 54409880043.exe 2320 Order 54409880043.exe 2320 Order 54409880043.exe 2320 Order 54409880043.exe 2320 Order 54409880043.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Order 54409880043.exedescription pid Process procid_target PID 2320 wrote to memory of 3056 2320 Order 54409880043.exe 84 PID 2320 wrote to memory of 3056 2320 Order 54409880043.exe 84 PID 2320 wrote to memory of 3056 2320 Order 54409880043.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order 54409880043.exe"C:\Users\Admin\AppData\Local\Temp\Order 54409880043.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Order 54409880043.exe"C:\Users\Admin\AppData\Local\Temp\Order 54409880043.exe"2⤵PID:3056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 9922⤵
- Program crash
PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2320 -ip 23201⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD53c1357905197e81f502c9b0c4630c47c
SHA129121873e5d0504b22ee39a76f9538860184131d
SHA2560d330bbfd4cdef061cd8be5d5e9aac38484b197b52192327ddf1d2591505323c
SHA512833cf083f7ec5ece597ac0f6437321f12d140e671710f3aa0d9a789c20241ee2ba2492cf2b5d4bc0e93d12d6b4ac00e8f700502c284b44b2ab1bdb184bae7c03
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c