Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 06:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe
Resource
win7-20241023-en
windows7-x64
4 signatures
150 seconds
General
-
Target
Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe
-
Size
1.2MB
-
MD5
1e956cce584ed3910b0914ed03c5b396
-
SHA1
c8e5c8f09696b8d5c81ed979a5eba7066eba5305
-
SHA256
0c79a0b34b24ef2f69bb07586863afa5d3631398f79b895390ec2beddaa4fb78
-
SHA512
47196bae5faebcb994d690651d7ce91ae35482f24c42ebd290b681dd5f60dda421368c20bd849d81d5f8c6e882ef084d3ed5c3ed118d1f7133a23e3cd7e66b3f
-
SSDEEP
24576:J6QP6K2CngiZucOaCrYz4jEmW/g+xRri3Md+clMr+b1E43:tPb2CgcyrKmW/PHi3Hrqv
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2708 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 31 PID 2520 wrote to memory of 2708 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 31 PID 2520 wrote to memory of 2708 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 31 PID 2520 wrote to memory of 2708 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 31 PID 2520 wrote to memory of 2756 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 32 PID 2520 wrote to memory of 2756 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 32 PID 2520 wrote to memory of 2756 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 32 PID 2520 wrote to memory of 2756 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 32 PID 2520 wrote to memory of 1776 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 33 PID 2520 wrote to memory of 1776 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 33 PID 2520 wrote to memory of 1776 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 33 PID 2520 wrote to memory of 1776 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 33 PID 2520 wrote to memory of 2524 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 34 PID 2520 wrote to memory of 2524 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 34 PID 2520 wrote to memory of 2524 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 34 PID 2520 wrote to memory of 2524 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 34 PID 2520 wrote to memory of 2684 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 35 PID 2520 wrote to memory of 2684 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 35 PID 2520 wrote to memory of 2684 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 35 PID 2520 wrote to memory of 2684 2520 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe"{path}"2⤵PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe"{path}"2⤵PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe"{path}"2⤵PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe"{path}"2⤵PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe"{path}"2⤵PID:2684
-