Analysis

  • max time kernel
    96s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 01:25

General

  • Target

    AT0001-Purchase order.exe

  • Size

    316KB

  • MD5

    a98ae50f4a149db303f4e345c900c9f1

  • SHA1

    5fbda81750c932bf64d2a57d773867679953bc90

  • SHA256

    d93009185b1d089f922fbfc67ab4097a178f63b5f18f538a88b24a869ab70c12

  • SHA512

    45aa93cc3031e44b5d2478d918b6004932a3bbd51b9930cc47124aa67f3e0a1a1a830d170e0f959cf63423cb99b66eba2e3188047a579d2cd155dc96c103dbf6

  • SSDEEP

    6144:kNeZOWWFI0Dp6DHuZlsljfVaR9gnrBfp3lT:kN5WWFI0SHzlj3nr9pVT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AT0001-Purchase order.exe
    "C:\Users\Admin\AppData\Local\Temp\AT0001-Purchase order.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Users\Admin\AppData\Local\Temp\xhxsojqn.exe
      C:\Users\Admin\AppData\Local\Temp\xhxsojqn.exe C:\Users\Admin\AppData\Local\Temp\lrtvm
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3692
      • C:\Users\Admin\AppData\Local\Temp\xhxsojqn.exe
        C:\Users\Admin\AppData\Local\Temp\xhxsojqn.exe C:\Users\Admin\AppData\Local\Temp\lrtvm
        3⤵
          PID:2952
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 648
          3⤵
          • Program crash
          PID:1392
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3692 -ip 3692
      1⤵
        PID:4692

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\fn2rh4b8n9ntpdlwnu

        Filesize

        210KB

        MD5

        a54aa4b50f7094b132058491a76ebfa8

        SHA1

        10443981f6085918b774825a7e865be88ea45d6a

        SHA256

        93b2893199ee2f6b28e761bfd621d612bb438b95f652bc995490f73094dcb7d5

        SHA512

        64c1286730796087f1656af8b365b57fd3cba6d7b9fdda45002c92413b0d0cd40322e2da6717001f5a74d03a35124f85d0f87104f793396a717a24fb8835a3bd

      • C:\Users\Admin\AppData\Local\Temp\lrtvm

        Filesize

        4KB

        MD5

        eab172f7c2a6cd4dda552caf2d97b71d

        SHA1

        d2c997bc8f5ee13e6e4efc87f5214ae0259b021f

        SHA256

        724703b34be8f256a1fbe8734619063dd0d3bf3c05e444f47d29691bd941d84e

        SHA512

        5975d239634bf8cb95c3a6d6f629e90d17bd98670551dbbdb823aa06083340a514ce79de86e12306a3ef3092965350cd5240250756091a98016a1aabc8c77fb1

      • C:\Users\Admin\AppData\Local\Temp\xhxsojqn.exe

        Filesize

        4KB

        MD5

        cfb2774909a615a38d13977af09c6885

        SHA1

        53f7c365ec213d93da2d73250d706afd824c76d5

        SHA256

        8506e5d45c6f8e51e89c0e8e188f4bb0b5c3eb1c98a0d3dc7085087156382508

        SHA512

        da94a4ea2d0dcb75e45f9d7a36f413607ed521946539b6178840893c7ff066a259a8e5ed137ab4513473499776f251695f0180d7d9cb1656ba4f57c921e22b9d

      • memory/3692-8-0x0000000002170000-0x0000000002172000-memory.dmp

        Filesize

        8KB