Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 16:18
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order 4589012.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Purchase Order 4589012.exe
Resource
win10v2004-20240802-en
General
-
Target
Purchase Order 4589012.exe
-
Size
593KB
-
MD5
c14996b07681c32bfffc365b67b85be5
-
SHA1
3eef1730c800fb66ddcfdf03dff1a430886694d1
-
SHA256
ccb65f79de018225e7ca824cc70f81726e771019e53785d7a2a3772548fcfa23
-
SHA512
2a1dce34ab3163da645dc94e5695805b5d3485c0095504625c5b56a51c135eae2a2a326aa978c77fa46521ab6f6b41bac2332c52883745b0eb07821aa6b0b6b7
-
SSDEEP
12288:srjcW2k4zUwiOZKWj9sIZVETEwXBDwVbl9oQFQC/MRBaTJr:srYHZKm9/9COJy0w
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase Order 4589012.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2720 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2336 Purchase Order 4589012.exe 2336 Purchase Order 4589012.exe 2336 Purchase Order 4589012.exe 2336 Purchase Order 4589012.exe 2336 Purchase Order 4589012.exe 2336 Purchase Order 4589012.exe 2336 Purchase Order 4589012.exe 2336 Purchase Order 4589012.exe 2336 Purchase Order 4589012.exe 2336 Purchase Order 4589012.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2336 Purchase Order 4589012.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2720 2336 Purchase Order 4589012.exe 31 PID 2336 wrote to memory of 2720 2336 Purchase Order 4589012.exe 31 PID 2336 wrote to memory of 2720 2336 Purchase Order 4589012.exe 31 PID 2336 wrote to memory of 2720 2336 Purchase Order 4589012.exe 31 PID 2336 wrote to memory of 2840 2336 Purchase Order 4589012.exe 33 PID 2336 wrote to memory of 2840 2336 Purchase Order 4589012.exe 33 PID 2336 wrote to memory of 2840 2336 Purchase Order 4589012.exe 33 PID 2336 wrote to memory of 2840 2336 Purchase Order 4589012.exe 33 PID 2336 wrote to memory of 2724 2336 Purchase Order 4589012.exe 34 PID 2336 wrote to memory of 2724 2336 Purchase Order 4589012.exe 34 PID 2336 wrote to memory of 2724 2336 Purchase Order 4589012.exe 34 PID 2336 wrote to memory of 2724 2336 Purchase Order 4589012.exe 34 PID 2336 wrote to memory of 2588 2336 Purchase Order 4589012.exe 35 PID 2336 wrote to memory of 2588 2336 Purchase Order 4589012.exe 35 PID 2336 wrote to memory of 2588 2336 Purchase Order 4589012.exe 35 PID 2336 wrote to memory of 2588 2336 Purchase Order 4589012.exe 35 PID 2336 wrote to memory of 2800 2336 Purchase Order 4589012.exe 36 PID 2336 wrote to memory of 2800 2336 Purchase Order 4589012.exe 36 PID 2336 wrote to memory of 2800 2336 Purchase Order 4589012.exe 36 PID 2336 wrote to memory of 2800 2336 Purchase Order 4589012.exe 36 PID 2336 wrote to memory of 2580 2336 Purchase Order 4589012.exe 37 PID 2336 wrote to memory of 2580 2336 Purchase Order 4589012.exe 37 PID 2336 wrote to memory of 2580 2336 Purchase Order 4589012.exe 37 PID 2336 wrote to memory of 2580 2336 Purchase Order 4589012.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order 4589012.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order 4589012.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fbyfck" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9FA9.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order 4589012.exe"{path}"2⤵PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order 4589012.exe"{path}"2⤵PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order 4589012.exe"{path}"2⤵PID:2588
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order 4589012.exe"{path}"2⤵PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order 4589012.exe"{path}"2⤵PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a2b1292ab70532bae14b6e28af48c846
SHA1e5ec2fcc2f17818f307510c856821778cc3b8a31
SHA25612bd73830dbaa3902f6a81492310df704fe39f98c55aaae69c8ddb29fe9ccb97
SHA512b0cbb40c5771f897502461d542f39bd2d1e1773a7be1eb42d3d79b414aba07f6370e3b2840c4a92c911ccb8c01e1f6a3d1da2b373de8ff8d34886dada9215dc7