Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 13:57
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
order.exe
Resource
win7-20240903-en
windows7-x64
15 signatures
150 seconds
Behavioral task
behavioral2
Sample
order.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
order.exe
-
Size
1019KB
-
MD5
d9db66e37915ab21e28573d7f6bf310e
-
SHA1
daa966d3d523214c4de2d70e958e3686618800b9
-
SHA256
9e7e7c7a7cfe618cb154602ed9de8022dea6c07420c0b5361d57c8e2016bb109
-
SHA512
6fde4ab22e6aa120b80f3f512976a74014758f698560c169d162d3288acb54a2ea39d5d8b5af4e77f67236b687c07d599f5862378c7b10c9084c989c79e1fa32
-
SSDEEP
24576:1tb20pkaCqT5TBWgNQ7aquX9g1Ffa/6A:mVg5tQ7aqAqm5
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1272 3744 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
order.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language order.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
order.exepid Process 3744 order.exe 3744 order.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
order.exepid Process 3744 order.exe 3744 order.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
order.exedescription pid Process procid_target PID 3744 wrote to memory of 3396 3744 order.exe 86 PID 3744 wrote to memory of 3396 3744 order.exe 86 PID 3744 wrote to memory of 3396 3744 order.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\order.exe"C:\Users\Admin\AppData\Local\Temp\order.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\order.exe"2⤵PID:3396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 7242⤵
- Program crash
PID:1272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3744 -ip 37441⤵PID:1404