Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
New Order For 2000 Pieces.exe
Resource
win7-20240729-en
General
-
Target
New Order For 2000 Pieces.exe
-
Size
1.4MB
-
MD5
100b68f299f7e856b6f35cd57b1de24f
-
SHA1
586ddef28b2b7584d30299f48ae7e6362303ce08
-
SHA256
0c81dacc3052737225ca5c8f49411ee34ec21530b33946b972e38a483d61c5ac
-
SHA512
4182cbd833e3cbda7c77a80594f19314eb75c41dd0aac90fcd9ddb5af95c15583710eeb72610bdf3e4d3fa41d2bd580e95dc1ca18c8fa2703e2b2aacd35a9547
-
SSDEEP
24576:4kvRVnxRp9+Ai19YFC98FCI2Js9nT3jw+71SxAEbrRTChkN62XxiC350Mf:4+lNIAi1+A98FCIWwT331A5BGt250Mf
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pop.vbs New Order For 2000 Pieces.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4972 2892 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order For 2000 Pieces.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4768 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4884 powershell.exe 2892 New Order For 2000 Pieces.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2892 New Order For 2000 Pieces.exe Token: SeDebugPrivilege 4884 powershell.exe Token: SeDebugPrivilege 2892 New Order For 2000 Pieces.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2892 wrote to memory of 4744 2892 New Order For 2000 Pieces.exe 30 PID 2892 wrote to memory of 4744 2892 New Order For 2000 Pieces.exe 30 PID 2892 wrote to memory of 4744 2892 New Order For 2000 Pieces.exe 30 PID 2892 wrote to memory of 4744 2892 New Order For 2000 Pieces.exe 30 PID 4744 wrote to memory of 4768 4744 cmd.exe 32 PID 4744 wrote to memory of 4768 4744 cmd.exe 32 PID 4744 wrote to memory of 4768 4744 cmd.exe 32 PID 4744 wrote to memory of 4768 4744 cmd.exe 32 PID 2892 wrote to memory of 4884 2892 New Order For 2000 Pieces.exe 34 PID 2892 wrote to memory of 4884 2892 New Order For 2000 Pieces.exe 34 PID 2892 wrote to memory of 4884 2892 New Order For 2000 Pieces.exe 34 PID 2892 wrote to memory of 4884 2892 New Order For 2000 Pieces.exe 34 PID 2892 wrote to memory of 4972 2892 New Order For 2000 Pieces.exe 36 PID 2892 wrote to memory of 4972 2892 New Order For 2000 Pieces.exe 36 PID 2892 wrote to memory of 4972 2892 New Order For 2000 Pieces.exe 36 PID 2892 wrote to memory of 4972 2892 New Order For 2000 Pieces.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order For 2000 Pieces.exe"C:\Users\Admin\AppData\Local\Temp\New Order For 2000 Pieces.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:4768
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwATgBlAHcAIABPAHIAZABlAHIAIABGAG8AcgAgADIAMAAwADAAIABQAGkAZQBjAGUAcwAuAGUAeABlADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAEwAbwBjAGEAbABcAFQAZQBtAHAAXABOAGUAdwAgAE8AcgBkAGUAcgAgAEYAbwByACAAMgAwADAAMAAgAFAAaQBlAGMAZQBzAC4AZQB4AGUAOwBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXABwAG8AcAAuAGUAeABlADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXABwAG8AcAAuAGUAeABlAA==2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 5402⤵
- Program crash
PID:4972
-