Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2024 06:42
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20240903-en
windows7-x64
14 signatures
150 seconds
General
-
Target
New Order.exe
-
Size
538KB
-
MD5
fed5b3d1972774645a11685a33140e28
-
SHA1
c9ea3cdc9f537fe50088c07c239c69dea4456ddc
-
SHA256
15582393b01b6c64d16d7c573cec24dc00954c1faede0dc69777a1caa9757f7d
-
SHA512
5682fcc7f55a8915dceeda6ce0b6cb60f993987c2631c7b4024d6afc78cd94cc345561e59ac15df2fe9511a92736ef387354f703287ac1326d9da694ee269680
-
SSDEEP
12288:V9BvctM85t35JPNJj2WzoRLQYRYzmYcwbzbpFMQWaJZpQEB52oSwc3:VD0tM85tbNJjldeYiYpi+so1c3
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2680-5-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/2680-0-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/2680-5-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2000 2680 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2680 New Order.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2680 New Order.exe 2680 New Order.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2680 New Order.exe 2680 New Order.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2680 wrote to memory of 4992 2680 New Order.exe 87 PID 2680 wrote to memory of 4992 2680 New Order.exe 87 PID 2680 wrote to memory of 4992 2680 New Order.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"2⤵PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 7602⤵
- Program crash
PID:2000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2680 -ip 26801⤵PID:1356