Analysis
-
max time kernel
95s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 19:20
Static task
static1
Behavioral task
behavioral1
Sample
PO 036086-06709 -2024 -Order pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO 036086-06709 -2024 -Order pdf.exe
Resource
win10v2004-20240802-en
General
-
Target
PO 036086-06709 -2024 -Order pdf.exe
-
Size
2.9MB
-
MD5
f74fb3c0c8708b7e11eb2da3703fa582
-
SHA1
ce258c4c0d7e409afb736295e82cc095fb244ac6
-
SHA256
154976468ad4be5f36dc0f0ea701a8270cc8240fb22ed705e2ccba689b663056
-
SHA512
3f9a942543378f1ac97e517d7d4e4fb5bc6ab773fd155f1dd8dc574fb1c88bdf3e12425059242420fd0da4c3fdf86fb6ba2ce1e63c38a9d5b92b331ccfc2f485
-
SSDEEP
49152:f3v+7/5QLa9dNZdu9hRRQWv+cWP1/Z0SZpKW3KXKQOylO0/x:f3v+73NZEhTpv+cWPJiSZnC9BD
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 2 IoCs
pid Process 4996 name.exe 1748 name.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023400-5.dat autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3352 1748 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO 036086-06709 -2024 -Order pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4996 name.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1088 wrote to memory of 4996 1088 PO 036086-06709 -2024 -Order pdf.exe 82 PID 1088 wrote to memory of 4996 1088 PO 036086-06709 -2024 -Order pdf.exe 82 PID 1088 wrote to memory of 4996 1088 PO 036086-06709 -2024 -Order pdf.exe 82 PID 4996 wrote to memory of 2480 4996 name.exe 83 PID 4996 wrote to memory of 2480 4996 name.exe 83 PID 4996 wrote to memory of 2480 4996 name.exe 83 PID 4996 wrote to memory of 1748 4996 name.exe 84 PID 4996 wrote to memory of 1748 4996 name.exe 84 PID 4996 wrote to memory of 1748 4996 name.exe 84 PID 1748 wrote to memory of 2396 1748 name.exe 85 PID 1748 wrote to memory of 2396 1748 name.exe 85 PID 1748 wrote to memory of 2396 1748 name.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO 036086-06709 -2024 -Order pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO 036086-06709 -2024 -Order pdf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\PO 036086-06709 -2024 -Order pdf.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\PO 036086-06709 -2024 -Order pdf.exe"3⤵PID:2480
-
-
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\directory\name.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\directory\name.exe"4⤵PID:2396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1748 -s 7084⤵
- Program crash
PID:3352
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1748 -ip 17481⤵PID:4700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5f74fb3c0c8708b7e11eb2da3703fa582
SHA1ce258c4c0d7e409afb736295e82cc095fb244ac6
SHA256154976468ad4be5f36dc0f0ea701a8270cc8240fb22ed705e2ccba689b663056
SHA5123f9a942543378f1ac97e517d7d4e4fb5bc6ab773fd155f1dd8dc574fb1c88bdf3e12425059242420fd0da4c3fdf86fb6ba2ce1e63c38a9d5b92b331ccfc2f485