Analysis
-
max time kernel
45s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 20:23
Static task
static1
Behavioral task
behavioral1
Sample
HCtR5cTfBBvX0Tt.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
HCtR5cTfBBvX0Tt.exe
Resource
win10v20201028
General
-
Target
HCtR5cTfBBvX0Tt.exe
-
Size
956KB
-
MD5
946617f29b6f4d728a590d6eaae36126
-
SHA1
d06818f1f24d85e26d7159845076f346564253a0
-
SHA256
45ef1e51df38e6778aaf2cd726748b55459b4aa54a2c8c2fea445cab0885f7bc
-
SHA512
7204f1163662f391fe09c2637ca9c2e07e08bc1c047fab4e1594c49a37fb222093d86298c267cec9ee27f842f538f480c2bb8078ffea59c501f4777ff50a7d2f
Malware Config
Signatures
-
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
Processes:
resource yara_rule behavioral1/memory/1912-6-0x0000000000270000-0x0000000000272000-memory.dmp coreentity -
Processes:
resource yara_rule behavioral1/memory/1912-7-0x0000000005EA0000-0x0000000005F52000-memory.dmp rezer0 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
HCtR5cTfBBvX0Tt.exepid process 1912 HCtR5cTfBBvX0Tt.exe 1912 HCtR5cTfBBvX0Tt.exe 1912 HCtR5cTfBBvX0Tt.exe 1912 HCtR5cTfBBvX0Tt.exe 1912 HCtR5cTfBBvX0Tt.exe 1912 HCtR5cTfBBvX0Tt.exe 1912 HCtR5cTfBBvX0Tt.exe 1912 HCtR5cTfBBvX0Tt.exe 1912 HCtR5cTfBBvX0Tt.exe 1912 HCtR5cTfBBvX0Tt.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
HCtR5cTfBBvX0Tt.exedescription pid process Token: SeDebugPrivilege 1912 HCtR5cTfBBvX0Tt.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
HCtR5cTfBBvX0Tt.exedescription pid process target process PID 1912 wrote to memory of 1720 1912 HCtR5cTfBBvX0Tt.exe schtasks.exe PID 1912 wrote to memory of 1720 1912 HCtR5cTfBBvX0Tt.exe schtasks.exe PID 1912 wrote to memory of 1720 1912 HCtR5cTfBBvX0Tt.exe schtasks.exe PID 1912 wrote to memory of 1720 1912 HCtR5cTfBBvX0Tt.exe schtasks.exe PID 1912 wrote to memory of 392 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 392 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 392 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 392 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 1112 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 1112 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 1112 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 1112 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 940 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 940 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 940 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 940 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 1608 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 1608 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 1608 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 1608 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 832 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 832 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 832 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe PID 1912 wrote to memory of 832 1912 HCtR5cTfBBvX0Tt.exe HCtR5cTfBBvX0Tt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HCtR5cTfBBvX0Tt.exe"C:\Users\Admin\AppData\Local\Temp\HCtR5cTfBBvX0Tt.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AvKneptmDajjT" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBD27.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\HCtR5cTfBBvX0Tt.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\HCtR5cTfBBvX0Tt.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\HCtR5cTfBBvX0Tt.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\HCtR5cTfBBvX0Tt.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\HCtR5cTfBBvX0Tt.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpBD27.tmpMD5
2491d7781a66eb43254b6d9cf075164c
SHA1ab9b35250344945d6ca192a361c00e59207fc9a1
SHA256f18483d46fb152f4cc6e5bf89cda2762c93293892e6dacebde1949d7e3ba2f00
SHA51247da39dc34df24844e3c6c302e3254c3d4ca94162692f8387fffa0785ca576a62068dfc93538511bb7cbd9ef5a1969765e0e055ab09527bc359a41215e5845a0
-
memory/1720-9-0x0000000000000000-mapping.dmp
-
memory/1912-0-0x0000000074320000-0x0000000074A0E000-memory.dmpFilesize
6.9MB
-
memory/1912-1-0x0000000000370000-0x0000000000371000-memory.dmpFilesize
4KB
-
memory/1912-3-0x00000000080F0000-0x00000000081B5000-memory.dmpFilesize
788KB
-
memory/1912-4-0x0000000000680000-0x0000000000691000-memory.dmpFilesize
68KB
-
memory/1912-6-0x0000000000270000-0x0000000000272000-memory.dmpFilesize
8KB
-
memory/1912-7-0x0000000005EA0000-0x0000000005F52000-memory.dmpFilesize
712KB