Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
05/11/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER PURCHASE.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
NEW ORDER PURCHASE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
NEW ORDER PURCHASE.exe
-
Size
656KB
-
MD5
ca2ed1b927f4bee1cd1f24bb19f4c0e1
-
SHA1
d1b7dc1cc0412301c61660d0d5cb02d20a6aa77d
-
SHA256
030324e0a31427fd63213acd29f3cdf5b445a6ec03eb803fb08dbf3a0c1b258b
-
SHA512
153939e1eeaeb2e3d4fc9f487ce039fde403a18ea94466c55c53ce5e00aefa59ae3324c03687c1794c7d321da9b2dced1bca2a658d5da54e0acb76dfff4d3da7
-
SSDEEP
12288:cT02YrvZq2mPKxG3sfYFwJH9ZzkwGQWOsKWLCp6X9uruAK5Gi:cTbYdqfKxG3swyVk7QWOhW+p6NBAWGi
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2536 NEW ORDER PURCHASE.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2536 NEW ORDER PURCHASE.exe 2272 NEW ORDER PURCHASE.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2536 set thread context of 2272 2536 NEW ORDER PURCHASE.exe 31 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\slutstrenge.tri NEW ORDER PURCHASE.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\Semiprofessionalized248\evaluxir.pra NEW ORDER PURCHASE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NEW ORDER PURCHASE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NEW ORDER PURCHASE.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2536 NEW ORDER PURCHASE.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2272 2536 NEW ORDER PURCHASE.exe 31 PID 2536 wrote to memory of 2272 2536 NEW ORDER PURCHASE.exe 31 PID 2536 wrote to memory of 2272 2536 NEW ORDER PURCHASE.exe 31 PID 2536 wrote to memory of 2272 2536 NEW ORDER PURCHASE.exe 31 PID 2536 wrote to memory of 2272 2536 NEW ORDER PURCHASE.exe 31 PID 2536 wrote to memory of 2272 2536 NEW ORDER PURCHASE.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER PURCHASE.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER PURCHASE.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\NEW ORDER PURCHASE.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER PURCHASE.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5564bb0373067e1785cba7e4c24aab4bf
SHA17c9416a01d821b10b2eef97b80899d24014d6fc1
SHA2567a9ddee34562cd3703f1502b5c70e99cd5bba15de2b6845a3555033d7f6cb2a5
SHA51222c61a323cb9293d7ec5c7e7e60674d0e2f7b29d55be25eb3c128ea2cd7440a1400cee17c43896b996278007c0d247f331a9b8964e3a40a0eb1404a9596c4472