Analysis
-
max time kernel
125s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
New Order For PO 109467-NO 003756-RTX 1047.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
New Order For PO 109467-NO 003756-RTX 1047.exe
Resource
win10v2004-20240802-en
General
-
Target
New Order For PO 109467-NO 003756-RTX 1047.exe
-
Size
3.0MB
-
MD5
f5403162c5e703ccf6aa2fa342683da2
-
SHA1
e460c380b4ca822bf3db7cbc0fee9832625627fa
-
SHA256
257075f1bea761d44685a2e110c9f2e39282f46cecae12161b3c350406c52b69
-
SHA512
7ed506bd08b8377497732eef1e8ddf2fb21da12a8b0e2834c7f42b5b21d3bd5d744e735fa6fab9adb382c8aede34f430aed4f742a94a176c0d8fa3abab3ca709
-
SSDEEP
49152:7JZoQrbTFZY1iaCrBB/ohPkD1RLg7edHuAVz/XnCT4aJKFB2p6NXTbqQH5lU/eb8:7trbTA1QBBQhIVg4O8fCTNQFkYNjGt/F
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 1924 name.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x00070000000235d7-5.dat autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3788 1924 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order For PO 109467-NO 003756-RTX 1047.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3208 wrote to memory of 1924 3208 New Order For PO 109467-NO 003756-RTX 1047.exe 89 PID 3208 wrote to memory of 1924 3208 New Order For PO 109467-NO 003756-RTX 1047.exe 89 PID 3208 wrote to memory of 1924 3208 New Order For PO 109467-NO 003756-RTX 1047.exe 89 PID 1924 wrote to memory of 572 1924 name.exe 90 PID 1924 wrote to memory of 572 1924 name.exe 90 PID 1924 wrote to memory of 572 1924 name.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order For PO 109467-NO 003756-RTX 1047.exe"C:\Users\Admin\AppData\Local\Temp\New Order For PO 109467-NO 003756-RTX 1047.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\New Order For PO 109467-NO 003756-RTX 1047.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\New Order For PO 109467-NO 003756-RTX 1047.exe"3⤵PID:572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 7403⤵
- Program crash
PID:3788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1924 -ip 19241⤵PID:1056
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4336,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4324 /prefetch:81⤵PID:348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5f5403162c5e703ccf6aa2fa342683da2
SHA1e460c380b4ca822bf3db7cbc0fee9832625627fa
SHA256257075f1bea761d44685a2e110c9f2e39282f46cecae12161b3c350406c52b69
SHA5127ed506bd08b8377497732eef1e8ddf2fb21da12a8b0e2834c7f42b5b21d3bd5d744e735fa6fab9adb382c8aede34f430aed4f742a94a176c0d8fa3abab3ca709