Analysis
-
max time kernel
152s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:19
Static task
static1
Behavioral task
behavioral1
Sample
Disposable protective clothings PCKIN #6176.exe
Resource
win7-20220414-en
General
-
Target
Disposable protective clothings PCKIN #6176.exe
-
Size
316KB
-
MD5
467a66feca37c23d56c08770cbfc5703
-
SHA1
b8850adf52c37f40bd0b58f6e959c987adac2794
-
SHA256
e2441bea072dce22af4853106891cb87d314461749fde2b31a0f6b3521e5daa3
-
SHA512
2b893ee0d270c4aa9b181c305aec9423af27dbbbcfbe0cb38b6c0b8ac6a5c486e7795d77146000a20776b4fdd68118245e267f3bfc58e73218248cf56ae74cf1
Malware Config
Extracted
asyncrat
0.5.6D
MIKEMIKE
185.165.153.215:6606
uqeolevmck
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
Processes:
resource yara_rule behavioral1/memory/1656-56-0x0000000000210000-0x0000000000218000-memory.dmp coreentity -
Async RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1408-63-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1408-64-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1408-65-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1408-66-0x000000000040C5FE-mapping.dmp asyncrat behavioral1/memory/1408-68-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1408-70-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/1656-57-0x00000000002B0000-0x00000000002CA000-memory.dmp rezer0 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Disposable protective clothings PCKIN #6176.exedescription pid process target process PID 1656 set thread context of 1408 1656 Disposable protective clothings PCKIN #6176.exe Disposable protective clothings PCKIN #6176.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Disposable protective clothings PCKIN #6176.exepid process 1656 Disposable protective clothings PCKIN #6176.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Disposable protective clothings PCKIN #6176.exedescription pid process Token: SeDebugPrivilege 1656 Disposable protective clothings PCKIN #6176.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Disposable protective clothings PCKIN #6176.exedescription pid process target process PID 1656 wrote to memory of 2032 1656 Disposable protective clothings PCKIN #6176.exe schtasks.exe PID 1656 wrote to memory of 2032 1656 Disposable protective clothings PCKIN #6176.exe schtasks.exe PID 1656 wrote to memory of 2032 1656 Disposable protective clothings PCKIN #6176.exe schtasks.exe PID 1656 wrote to memory of 2032 1656 Disposable protective clothings PCKIN #6176.exe schtasks.exe PID 1656 wrote to memory of 1408 1656 Disposable protective clothings PCKIN #6176.exe Disposable protective clothings PCKIN #6176.exe PID 1656 wrote to memory of 1408 1656 Disposable protective clothings PCKIN #6176.exe Disposable protective clothings PCKIN #6176.exe PID 1656 wrote to memory of 1408 1656 Disposable protective clothings PCKIN #6176.exe Disposable protective clothings PCKIN #6176.exe PID 1656 wrote to memory of 1408 1656 Disposable protective clothings PCKIN #6176.exe Disposable protective clothings PCKIN #6176.exe PID 1656 wrote to memory of 1408 1656 Disposable protective clothings PCKIN #6176.exe Disposable protective clothings PCKIN #6176.exe PID 1656 wrote to memory of 1408 1656 Disposable protective clothings PCKIN #6176.exe Disposable protective clothings PCKIN #6176.exe PID 1656 wrote to memory of 1408 1656 Disposable protective clothings PCKIN #6176.exe Disposable protective clothings PCKIN #6176.exe PID 1656 wrote to memory of 1408 1656 Disposable protective clothings PCKIN #6176.exe Disposable protective clothings PCKIN #6176.exe PID 1656 wrote to memory of 1408 1656 Disposable protective clothings PCKIN #6176.exe Disposable protective clothings PCKIN #6176.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Disposable protective clothings PCKIN #6176.exe"C:\Users\Admin\AppData\Local\Temp\Disposable protective clothings PCKIN #6176.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YhQHxj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1B3F.tmp"2⤵
- Creates scheduled task(s)
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Disposable protective clothings PCKIN #6176.exe"{path}"2⤵PID:1408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp1B3F.tmpFilesize
1KB
MD507b5ac7675a92fb648652e2fce8fd9f1
SHA16a959a5db48148b0298bcf2d6536795473808e5c
SHA256bb20c4568e163e3276c99b0c9349b6f412e2420fb6b9dbca4015fe8a26fe5de3
SHA512fc31c5ea28716c88ea65489ae7cf09afaaacfa33863767eb5b5dec65ce436eea518afd2ca6a613faddfb20c0617a147954fc33a81713ecf7e6689ca6e2fecade
-
memory/1408-64-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1408-60-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1408-61-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1408-63-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1408-65-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1408-66-0x000000000040C5FE-mapping.dmp
-
memory/1408-68-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1408-70-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1656-56-0x0000000000210000-0x0000000000218000-memory.dmpFilesize
32KB
-
memory/1656-57-0x00000000002B0000-0x00000000002CA000-memory.dmpFilesize
104KB
-
memory/1656-55-0x0000000075361000-0x0000000075363000-memory.dmpFilesize
8KB
-
memory/1656-54-0x0000000010730000-0x0000000010782000-memory.dmpFilesize
328KB
-
memory/2032-58-0x0000000000000000-mapping.dmp