Analysis
-
max time kernel
30s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 15:48
Static task
static1
Behavioral task
behavioral1
Sample
New Order PO_O8475980U09_Inquiry,pdf.exe
Resource
win7-20240903-en
General
-
Target
New Order PO_O8475980U09_Inquiry,pdf.exe
-
Size
944KB
-
MD5
13c7674b5ddf04d0c1ff4c44b12aa4d4
-
SHA1
2d46412c7a2046c27b6549a31ad3dd9bf9a0935d
-
SHA256
d3e83ecbfc6ead31c132b85910c6dd0c7a0e5bb343231a289cdc4203fbd9d6ad
-
SHA512
2da740d5fdcdc49b9985bff25e2fdb187c9fb1545aaccccc895af46bb25a68b7f6966305bb07bf2340da0f223e364f250779d6ccc7d24273136eda141437a665
-
SSDEEP
24576:zu6J33O0c+JY5UZ+XC0kGso6FaPAe2tQlvJWY:du0c++OCvkGs9FaPAeUY
Malware Config
Extracted
xworm
5.0
212.162.149.196:7967
7rZTXi0ZDltxTxRZ
-
install_file
USB.exe
Extracted
redline
success
212.162.149.196:8062
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2696-22-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2696-26-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2696-24-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2696-30-0x00000000041A0000-0x00000000041F2000-memory.dmp family_redline -
Redline family
-
Xworm family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\croc.vbs croc.exe -
Executes dropped EXE 1 IoCs
pid Process 2748 croc.exe -
Loads dropped DLL 1 IoCs
pid Process 2652 New Order PO_O8475980U09_Inquiry,pdf.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x002d000000016dbe-8.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2748 set thread context of 2696 2748 croc.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order PO_O8475980U09_Inquiry,pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language croc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2696 RegSvcs.exe 2696 RegSvcs.exe 2696 RegSvcs.exe 2696 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2748 croc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2696 RegSvcs.exe Token: SeDebugPrivilege 2696 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2652 New Order PO_O8475980U09_Inquiry,pdf.exe 2652 New Order PO_O8475980U09_Inquiry,pdf.exe 2748 croc.exe 2748 croc.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2652 New Order PO_O8475980U09_Inquiry,pdf.exe 2652 New Order PO_O8475980U09_Inquiry,pdf.exe 2748 croc.exe 2748 croc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2696 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2748 2652 New Order PO_O8475980U09_Inquiry,pdf.exe 30 PID 2652 wrote to memory of 2748 2652 New Order PO_O8475980U09_Inquiry,pdf.exe 30 PID 2652 wrote to memory of 2748 2652 New Order PO_O8475980U09_Inquiry,pdf.exe 30 PID 2652 wrote to memory of 2748 2652 New Order PO_O8475980U09_Inquiry,pdf.exe 30 PID 2748 wrote to memory of 2696 2748 croc.exe 31 PID 2748 wrote to memory of 2696 2748 croc.exe 31 PID 2748 wrote to memory of 2696 2748 croc.exe 31 PID 2748 wrote to memory of 2696 2748 croc.exe 31 PID 2748 wrote to memory of 2696 2748 croc.exe 31 PID 2748 wrote to memory of 2696 2748 croc.exe 31 PID 2748 wrote to memory of 2696 2748 croc.exe 31 PID 2748 wrote to memory of 2696 2748 croc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order PO_O8475980U09_Inquiry,pdf.exe"C:\Users\Admin\AppData\Local\Temp\New Order PO_O8475980U09_Inquiry,pdf.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\peristeromorphous\croc.exe"C:\Users\Admin\AppData\Local\Temp\New Order PO_O8475980U09_Inquiry,pdf.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\New Order PO_O8475980U09_Inquiry,pdf.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944KB
MD513c7674b5ddf04d0c1ff4c44b12aa4d4
SHA12d46412c7a2046c27b6549a31ad3dd9bf9a0935d
SHA256d3e83ecbfc6ead31c132b85910c6dd0c7a0e5bb343231a289cdc4203fbd9d6ad
SHA5122da740d5fdcdc49b9985bff25e2fdb187c9fb1545aaccccc895af46bb25a68b7f6966305bb07bf2340da0f223e364f250779d6ccc7d24273136eda141437a665