Analysis
-
max time kernel
94s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 08:44
Static task
static1
Behavioral task
behavioral1
Sample
order list.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
order list.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/bpibxkjlns.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/bpibxkjlns.dll
Resource
win10v2004-20241007-en
General
-
Target
order list.exe
-
Size
252KB
-
MD5
8e07e5bfcdfb06fe00332798af731c1b
-
SHA1
f937ba7129daff91a011aaa5ce767db5763c359c
-
SHA256
1f7edeff96ea1955ea6642e4d739f6a98cb1315d9f78fe23ae3419fb24878103
-
SHA512
c2ec48656985a8190f10305fc8d11162453457322fceb11c95cd87e0a18099697e3d815db42e0f82166edcf02170c2bf85b4c034d1daeeb285a8466ddaef9318
-
SSDEEP
6144:wBlL/cdXKcGiepdi1NxLY4kMa/ETi3d09+cy5x7Yq:CedzkEr0x/ETYsjyX8q
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4656 order list.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3148 4656 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language order list.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4656 wrote to memory of 3192 4656 order list.exe 83 PID 4656 wrote to memory of 3192 4656 order list.exe 83 PID 4656 wrote to memory of 3192 4656 order list.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\order list.exe"C:\Users\Admin\AppData\Local\Temp\order list.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\order list.exe"C:\Users\Admin\AppData\Local\Temp\order list.exe"2⤵PID:3192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 10122⤵
- Program crash
PID:3148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4656 -ip 46561⤵PID:3196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5baf456a0f50b4a00dd3a624bb46b5950
SHA11d896ed35f724cd6e5168ebc7e5e670f85eb36f9
SHA256de5e7a9b204e8cdeaf9c002a81732d8487c4547c0c98d353cab896f92b8c851d
SHA512e883bfaed10a560ac83b8466e524032148873b3c70411da25124db486863413749cec9e5b80cf593a2f81bca23b139172d8c8e49eb0a2b744b497c5f3a3b13ae