Analysis
-
max time kernel
93s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 17:16
Static task
static1
Behavioral task
behavioral1
Sample
PO 09770_MQ 018370_04847_Order.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO 09770_MQ 018370_04847_Order.exe
Resource
win10v2004-20241007-en
General
-
Target
PO 09770_MQ 018370_04847_Order.exe
-
Size
1.9MB
-
MD5
0f116a860d055461e73e35536787c02f
-
SHA1
fb7b079ca9599aa530920ce445cc33cdc4f62883
-
SHA256
1ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85
-
SHA512
c7ad85c56568a6c8a3749cdb8030d84d3830f1c23448472bc6255dec8dfab5205e462cb2f7990a019e9885718f9d040a442638f66f33da5509e2c68508614b20
-
SSDEEP
49152:xVg5tQ7a/05spYndBKm6SJxKogrSWzWZ6+2ULK5:/g565hJJAWWKZ6+Z
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Clinton.vbs Clinton.exe -
Executes dropped EXE 1 IoCs
pid Process 3964 Clinton.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000c000000023b8d-9.dat autoit_exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3708 3964 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clinton.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO 09770_MQ 018370_04847_Order.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3908 PO 09770_MQ 018370_04847_Order.exe 3908 PO 09770_MQ 018370_04847_Order.exe 3964 Clinton.exe 3964 Clinton.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3908 PO 09770_MQ 018370_04847_Order.exe 3908 PO 09770_MQ 018370_04847_Order.exe 3964 Clinton.exe 3964 Clinton.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3908 wrote to memory of 3964 3908 PO 09770_MQ 018370_04847_Order.exe 83 PID 3908 wrote to memory of 3964 3908 PO 09770_MQ 018370_04847_Order.exe 83 PID 3908 wrote to memory of 3964 3908 PO 09770_MQ 018370_04847_Order.exe 83 PID 3964 wrote to memory of 4804 3964 Clinton.exe 84 PID 3964 wrote to memory of 4804 3964 Clinton.exe 84 PID 3964 wrote to memory of 4804 3964 Clinton.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO 09770_MQ 018370_04847_Order.exe"C:\Users\Admin\AppData\Local\Temp\PO 09770_MQ 018370_04847_Order.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\teepees\Clinton.exe"C:\Users\Admin\AppData\Local\Temp\PO 09770_MQ 018370_04847_Order.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\PO 09770_MQ 018370_04847_Order.exe"3⤵PID:4804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 7243⤵
- Program crash
PID:3708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3964 -ip 39641⤵PID:3544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD50f116a860d055461e73e35536787c02f
SHA1fb7b079ca9599aa530920ce445cc33cdc4f62883
SHA2561ff525639971954f7b8f90e599b8ad269b40b6d34a074e18e5f44bf0f85a0a85
SHA512c7ad85c56568a6c8a3749cdb8030d84d3830f1c23448472bc6255dec8dfab5205e462cb2f7990a019e9885718f9d040a442638f66f33da5509e2c68508614b20