Analysis
-
max time kernel
135s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
Doctor firm order form.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Doctor firm order form.exe
Resource
win10v2004-20240910-en
General
-
Target
Doctor firm order form.exe
-
Size
669KB
-
MD5
7921d3a2df6061b71d17c17db395b7e0
-
SHA1
3e4fcc203670021c89724d79519c173b3f65e987
-
SHA256
d93978a9bffc17a585440b55863b852331f8a24bd2f13ab16a32c5ccbcf9eddd
-
SHA512
79b82ba94f911a9a750d69018ab4660c76d9130de24d27c02562ea3232dff90d89e13a7165c72fa87cb25d042d1371ebc0fe827b17ba25416a5652d01883d270
-
SSDEEP
12288:YI9A8OQDqMbCU82kfGYOO5Xf/exzg+EUPi0j3e04YoJwRg5vNKW3JugtzZCGGVLc:YIKNWqMX82kfGYOc/OzgOaIu0ROwRSNN
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2180 set thread context of 2304 2180 Doctor firm order form.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doctor firm order form.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2180 Doctor firm order form.exe 2180 Doctor firm order form.exe 2180 Doctor firm order form.exe 2180 Doctor firm order form.exe 2180 Doctor firm order form.exe 2180 Doctor firm order form.exe 2304 Doctor firm order form.exe 2304 Doctor firm order form.exe 2304 Doctor firm order form.exe 2304 Doctor firm order form.exe 2304 Doctor firm order form.exe 2304 Doctor firm order form.exe 2304 Doctor firm order form.exe 2304 Doctor firm order form.exe 2304 Doctor firm order form.exe 2304 Doctor firm order form.exe 2304 Doctor firm order form.exe 2304 Doctor firm order form.exe 2304 Doctor firm order form.exe 2304 Doctor firm order form.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2180 Doctor firm order form.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1884 2180 Doctor firm order form.exe 94 PID 2180 wrote to memory of 1884 2180 Doctor firm order form.exe 94 PID 2180 wrote to memory of 1884 2180 Doctor firm order form.exe 94 PID 2180 wrote to memory of 2832 2180 Doctor firm order form.exe 95 PID 2180 wrote to memory of 2832 2180 Doctor firm order form.exe 95 PID 2180 wrote to memory of 2832 2180 Doctor firm order form.exe 95 PID 2180 wrote to memory of 2304 2180 Doctor firm order form.exe 96 PID 2180 wrote to memory of 2304 2180 Doctor firm order form.exe 96 PID 2180 wrote to memory of 2304 2180 Doctor firm order form.exe 96 PID 2180 wrote to memory of 2304 2180 Doctor firm order form.exe 96 PID 2180 wrote to memory of 2304 2180 Doctor firm order form.exe 96 PID 2180 wrote to memory of 2304 2180 Doctor firm order form.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Doctor firm order form.exe"C:\Users\Admin\AppData\Local\Temp\Doctor firm order form.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Doctor firm order form.exe"C:\Users\Admin\AppData\Local\Temp\Doctor firm order form.exe"2⤵PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\Doctor firm order form.exe"C:\Users\Admin\AppData\Local\Temp\Doctor firm order form.exe"2⤵PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\Doctor firm order form.exe"C:\Users\Admin\AppData\Local\Temp\Doctor firm order form.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304
-