Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 08:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ORDER ENQUIRY.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
ORDER ENQUIRY.exe
-
Size
679KB
-
MD5
754fa726ba767c17ebbce69e967d40ca
-
SHA1
b011ef478a435e685c3180d10c1c25bbc58ce105
-
SHA256
79bcad797129c0be508de0fe7b0462b1aaffbafa74a4e7019a4561deb674f4bd
-
SHA512
ad6b237579b0d4f9993e0894a6923882243df1d3b7722fb9496962dfd6c5b7a7828e7ff4d6b4c8adba621e58ffdd6dc33bb3dc9650ec461fa457a50785217177
-
SSDEEP
12288:dE3YCt5VADTdLpS8UMYw3Etz44KBvC3eimLMXm:dwYCmLpS9k3E944Ko3eiUF
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ORDER ENQUIRY.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2536 ORDER ENQUIRY.exe 2536 ORDER ENQUIRY.exe 2536 ORDER ENQUIRY.exe 2536 ORDER ENQUIRY.exe 2536 ORDER ENQUIRY.exe 2536 ORDER ENQUIRY.exe 2536 ORDER ENQUIRY.exe 2536 ORDER ENQUIRY.exe 2536 ORDER ENQUIRY.exe 2536 ORDER ENQUIRY.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2536 ORDER ENQUIRY.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2252 2536 ORDER ENQUIRY.exe 31 PID 2536 wrote to memory of 2252 2536 ORDER ENQUIRY.exe 31 PID 2536 wrote to memory of 2252 2536 ORDER ENQUIRY.exe 31 PID 2536 wrote to memory of 2252 2536 ORDER ENQUIRY.exe 31 PID 2536 wrote to memory of 2796 2536 ORDER ENQUIRY.exe 32 PID 2536 wrote to memory of 2796 2536 ORDER ENQUIRY.exe 32 PID 2536 wrote to memory of 2796 2536 ORDER ENQUIRY.exe 32 PID 2536 wrote to memory of 2796 2536 ORDER ENQUIRY.exe 32 PID 2536 wrote to memory of 2968 2536 ORDER ENQUIRY.exe 33 PID 2536 wrote to memory of 2968 2536 ORDER ENQUIRY.exe 33 PID 2536 wrote to memory of 2968 2536 ORDER ENQUIRY.exe 33 PID 2536 wrote to memory of 2968 2536 ORDER ENQUIRY.exe 33 PID 2536 wrote to memory of 2220 2536 ORDER ENQUIRY.exe 34 PID 2536 wrote to memory of 2220 2536 ORDER ENQUIRY.exe 34 PID 2536 wrote to memory of 2220 2536 ORDER ENQUIRY.exe 34 PID 2536 wrote to memory of 2220 2536 ORDER ENQUIRY.exe 34 PID 2536 wrote to memory of 2232 2536 ORDER ENQUIRY.exe 35 PID 2536 wrote to memory of 2232 2536 ORDER ENQUIRY.exe 35 PID 2536 wrote to memory of 2232 2536 ORDER ENQUIRY.exe 35 PID 2536 wrote to memory of 2232 2536 ORDER ENQUIRY.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY.exe"2⤵PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY.exe"2⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY.exe"2⤵PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY.exe"2⤵PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\ORDER ENQUIRY.exe"2⤵PID:2232
-