Analysis

  • max time kernel
    23s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17-08-2024 08:40

General

  • Target

    New Order 01.exe

  • Size

    1.2MB

  • MD5

    8b4dd7361f14f8976387a44bb9bc846b

  • SHA1

    9bb7febab49e75e8234718806c94513ce149d79a

  • SHA256

    ae7d55977f010445b83b1eb544c65afe7cbd14e49ce0e47ea9939c7f010f214e

  • SHA512

    ce0c2f0801d750d62ef7b63ecdef3ee960407bd4c4e055b73568ae9ad73ab499f16c096940fafb65acb123489d88289c00e0eba794c82714b8109b74da7dd298

  • SSDEEP

    24576:LAHnh+eWsN3skA4RV1Hom2KXMmHahgURDzjXmHbmb0O5:mh+ZkldoPK8YahzRD0uh

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New Order 01.exe
    "C:\Users\Admin\AppData\Local\Temp\New Order 01.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\New Order 01.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Dunlop

    Filesize

    282KB

    MD5

    c25908ee46c66fc5a2488a3c62e8f8b8

    SHA1

    711d24f396e0dd1f51d5b98cb35c3e89e4040c49

    SHA256

    983305dfc1e061e188bf239a02c57146f179c0f8f41b359a60dd182a6012719d

    SHA512

    a77da3994c8469e4f2f5f242da0bc7ba36d02ecf371c7b1d351a38ee09fa4fc4aa6e21d7efa1ca802ac6cee5cb8192d1fb7189d892d408d921f2fe2543e49675

  • memory/2020-12-0x0000000000560000-0x0000000000564000-memory.dmp

    Filesize

    16KB

  • memory/2256-13-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2256-14-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2256-15-0x00000000008F0000-0x0000000000BF3000-memory.dmp

    Filesize

    3.0MB