Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:22
Static task
static1
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
New Order.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
New Order.exe
-
Size
200KB
-
MD5
9b4f723dbb86d64168d8347abc60f232
-
SHA1
6bb06b4992e8212ad8eb82ef6dbe96039508680a
-
SHA256
688ac6f12f6c5e6342e8a357aa09f94a35000967c391c17d7264fca65098600a
-
SHA512
5330fbbe2312a6bfa050907cc1b67f00aefdf32cfb671c956fdea6411ac6623fa9352472d942c3f3eb9dddc3908ac4024908b0276e15df773835cc9828a769e2
-
SSDEEP
6144:QBlL/3Ym6NjZ1ZIRwHugFHe/HUiqcVMvTX:iVp6TfbOgF+ZDML
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1980 New Order.exe 1980 New Order.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2544 1980 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1980 wrote to memory of 716 1980 New Order.exe 82 PID 1980 wrote to memory of 716 1980 New Order.exe 82 PID 1980 wrote to memory of 716 1980 New Order.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"2⤵PID:716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 9242⤵
- Program crash
PID:2544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1980 -ip 19801⤵PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3