Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2024 06:42
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20240903-en
General
-
Target
New Order.exe
-
Size
538KB
-
MD5
fed5b3d1972774645a11685a33140e28
-
SHA1
c9ea3cdc9f537fe50088c07c239c69dea4456ddc
-
SHA256
15582393b01b6c64d16d7c573cec24dc00954c1faede0dc69777a1caa9757f7d
-
SHA512
5682fcc7f55a8915dceeda6ce0b6cb60f993987c2631c7b4024d6afc78cd94cc345561e59ac15df2fe9511a92736ef387354f703287ac1326d9da694ee269680
-
SSDEEP
12288:V9BvctM85t35JPNJj2WzoRLQYRYzmYcwbzbpFMQWaJZpQEB52oSwc3:VD0tM85tbNJjldeYiYpi+so1c3
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/2680-5-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe -
Processes:
resource yara_rule behavioral2/memory/2680-0-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/2680-5-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2000 2680 WerFault.exe New Order.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
New Order.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
New Order.exepid process 2680 New Order.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
New Order.exepid process 2680 New Order.exe 2680 New Order.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
New Order.exepid process 2680 New Order.exe 2680 New Order.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
New Order.exedescription pid process target process PID 2680 wrote to memory of 4992 2680 New Order.exe svchost.exe PID 2680 wrote to memory of 4992 2680 New Order.exe svchost.exe PID 2680 wrote to memory of 4992 2680 New Order.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"2⤵PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 7602⤵
- Program crash
PID:2000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2680 -ip 26801⤵PID:1356