Analysis
-
max time kernel
96s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
AT0001-Purchase order.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AT0001-Purchase order.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
xhxsojqn.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
xhxsojqn.exe
Resource
win10v2004-20241007-en
General
-
Target
AT0001-Purchase order.exe
-
Size
316KB
-
MD5
a98ae50f4a149db303f4e345c900c9f1
-
SHA1
5fbda81750c932bf64d2a57d773867679953bc90
-
SHA256
d93009185b1d089f922fbfc67ab4097a178f63b5f18f538a88b24a869ab70c12
-
SHA512
45aa93cc3031e44b5d2478d918b6004932a3bbd51b9930cc47124aa67f3e0a1a1a830d170e0f959cf63423cb99b66eba2e3188047a579d2cd155dc96c103dbf6
-
SSDEEP
6144:kNeZOWWFI0Dp6DHuZlsljfVaR9gnrBfp3lT:kN5WWFI0SHzlj3nr9pVT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3692 xhxsojqn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1392 3692 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AT0001-Purchase order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhxsojqn.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5112 wrote to memory of 3692 5112 AT0001-Purchase order.exe 85 PID 5112 wrote to memory of 3692 5112 AT0001-Purchase order.exe 85 PID 5112 wrote to memory of 3692 5112 AT0001-Purchase order.exe 85 PID 3692 wrote to memory of 2952 3692 xhxsojqn.exe 86 PID 3692 wrote to memory of 2952 3692 xhxsojqn.exe 86 PID 3692 wrote to memory of 2952 3692 xhxsojqn.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\AT0001-Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\AT0001-Purchase order.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\xhxsojqn.exeC:\Users\Admin\AppData\Local\Temp\xhxsojqn.exe C:\Users\Admin\AppData\Local\Temp\lrtvm2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\xhxsojqn.exeC:\Users\Admin\AppData\Local\Temp\xhxsojqn.exe C:\Users\Admin\AppData\Local\Temp\lrtvm3⤵PID:2952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 6483⤵
- Program crash
PID:1392
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3692 -ip 36921⤵PID:4692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5a54aa4b50f7094b132058491a76ebfa8
SHA110443981f6085918b774825a7e865be88ea45d6a
SHA25693b2893199ee2f6b28e761bfd621d612bb438b95f652bc995490f73094dcb7d5
SHA51264c1286730796087f1656af8b365b57fd3cba6d7b9fdda45002c92413b0d0cd40322e2da6717001f5a74d03a35124f85d0f87104f793396a717a24fb8835a3bd
-
Filesize
4KB
MD5eab172f7c2a6cd4dda552caf2d97b71d
SHA1d2c997bc8f5ee13e6e4efc87f5214ae0259b021f
SHA256724703b34be8f256a1fbe8734619063dd0d3bf3c05e444f47d29691bd941d84e
SHA5125975d239634bf8cb95c3a6d6f629e90d17bd98670551dbbdb823aa06083340a514ce79de86e12306a3ef3092965350cd5240250756091a98016a1aabc8c77fb1
-
Filesize
4KB
MD5cfb2774909a615a38d13977af09c6885
SHA153f7c365ec213d93da2d73250d706afd824c76d5
SHA2568506e5d45c6f8e51e89c0e8e188f4bb0b5c3eb1c98a0d3dc7085087156382508
SHA512da94a4ea2d0dcb75e45f9d7a36f413607ed521946539b6178840893c7ff066a259a8e5ed137ab4513473499776f251695f0180d7d9cb1656ba4f57c921e22b9d