Analysis

  • max time kernel
    122s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 13:20

General

  • Target

    New Order For 2000 Pieces.exe

  • Size

    1.4MB

  • MD5

    100b68f299f7e856b6f35cd57b1de24f

  • SHA1

    586ddef28b2b7584d30299f48ae7e6362303ce08

  • SHA256

    0c81dacc3052737225ca5c8f49411ee34ec21530b33946b972e38a483d61c5ac

  • SHA512

    4182cbd833e3cbda7c77a80594f19314eb75c41dd0aac90fcd9ddb5af95c15583710eeb72610bdf3e4d3fa41d2bd580e95dc1ca18c8fa2703e2b2aacd35a9547

  • SSDEEP

    24576:4kvRVnxRp9+Ai19YFC98FCI2Js9nT3jw+71SxAEbrRTChkN62XxiC350Mf:4+lNIAi1+A98FCIWwT331A5BGt250Mf

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New Order For 2000 Pieces.exe
    "C:\Users\Admin\AppData\Local\Temp\New Order For 2000 Pieces.exe"
    1⤵
    • Drops startup file
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /release
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4744
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /release
        3⤵
        • System Location Discovery: System Language Discovery
        • Gathers network information
        PID:4768
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4884
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 540
      2⤵
      • Program crash
      PID:4972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2892-0-0x0000000074E8E000-0x0000000074E8F000-memory.dmp

    Filesize

    4KB

  • memory/2892-1-0x0000000000AD0000-0x0000000000C34000-memory.dmp

    Filesize

    1.4MB

  • memory/2892-2-0x0000000004FA0000-0x00000000050B6000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-3-0x0000000074E80000-0x000000007556E000-memory.dmp

    Filesize

    6.9MB

  • memory/2892-4-0x00000000051C0000-0x00000000052D4000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-5-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-6-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-12-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-8-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-10-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-16-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-22-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-26-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-28-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-32-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-30-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-34-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-36-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-40-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-42-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-44-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-38-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-46-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-48-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-52-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-56-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-54-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-50-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-58-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-62-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-66-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-64-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-68-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-60-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-24-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-20-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-18-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-14-0x00000000051C0000-0x00000000052CE000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-1341-0x0000000074E80000-0x000000007556E000-memory.dmp

    Filesize

    6.9MB

  • memory/2892-1342-0x00000000020A0000-0x000000000210C000-memory.dmp

    Filesize

    432KB

  • memory/2892-1343-0x0000000004800000-0x000000000486A000-memory.dmp

    Filesize

    424KB

  • memory/2892-1344-0x0000000002130000-0x000000000217C000-memory.dmp

    Filesize

    304KB

  • memory/2892-1345-0x0000000074E8E000-0x0000000074E8F000-memory.dmp

    Filesize

    4KB

  • memory/2892-1346-0x0000000074E80000-0x000000007556E000-memory.dmp

    Filesize

    6.9MB

  • memory/2892-1347-0x0000000074E80000-0x000000007556E000-memory.dmp

    Filesize

    6.9MB

  • memory/2892-1350-0x00000000049B0000-0x0000000004A04000-memory.dmp

    Filesize

    336KB

  • memory/2892-1353-0x0000000074E80000-0x000000007556E000-memory.dmp

    Filesize

    6.9MB