Analysis
-
max time kernel
153s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:32
Static task
static1
Behavioral task
behavioral1
Sample
scan00001543.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
scan00001543.exe
Resource
win10v2004-20220414-en
General
-
Target
scan00001543.exe
-
Size
398KB
-
MD5
5678efb48a28b255830a91e260c2504e
-
SHA1
e030714e67ddeff23860be582553807d15c7f1e2
-
SHA256
717cc1c1cd1788a45027d549ae018a57f72e8f5f7586be633055c2400440b489
-
SHA512
c6146c170b937a7daa9e6be50f7df9eb552216222d474965a41730d4ddfbeaa00466bea48318951b1e5c33d6a79b9791d788ab4e4dc8fac51cea32d35cc54477
Malware Config
Signatures
-
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
Processes:
resource yara_rule behavioral1/memory/860-56-0x0000000000930000-0x0000000000938000-memory.dmp coreentity -
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
Processes:
resource yara_rule behavioral1/memory/896-63-0x0000000000400000-0x0000000000444000-memory.dmp m00nd3v_logger behavioral1/memory/896-64-0x0000000000400000-0x0000000000444000-memory.dmp m00nd3v_logger behavioral1/memory/896-65-0x0000000000400000-0x0000000000444000-memory.dmp m00nd3v_logger behavioral1/memory/896-66-0x000000000043F95E-mapping.dmp m00nd3v_logger behavioral1/memory/896-68-0x0000000000400000-0x0000000000444000-memory.dmp m00nd3v_logger behavioral1/memory/896-70-0x0000000000400000-0x0000000000444000-memory.dmp m00nd3v_logger -
NirSoft MailPassView 10 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/896-63-0x0000000000400000-0x0000000000444000-memory.dmp MailPassView behavioral1/memory/896-64-0x0000000000400000-0x0000000000444000-memory.dmp MailPassView behavioral1/memory/896-65-0x0000000000400000-0x0000000000444000-memory.dmp MailPassView behavioral1/memory/896-66-0x000000000043F95E-mapping.dmp MailPassView behavioral1/memory/896-68-0x0000000000400000-0x0000000000444000-memory.dmp MailPassView behavioral1/memory/896-70-0x0000000000400000-0x0000000000444000-memory.dmp MailPassView behavioral1/memory/868-80-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral1/memory/868-81-0x000000000041211A-mapping.dmp MailPassView behavioral1/memory/868-84-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral1/memory/868-85-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView -
Nirsoft 10 IoCs
Processes:
resource yara_rule behavioral1/memory/896-63-0x0000000000400000-0x0000000000444000-memory.dmp Nirsoft behavioral1/memory/896-64-0x0000000000400000-0x0000000000444000-memory.dmp Nirsoft behavioral1/memory/896-65-0x0000000000400000-0x0000000000444000-memory.dmp Nirsoft behavioral1/memory/896-66-0x000000000043F95E-mapping.dmp Nirsoft behavioral1/memory/896-68-0x0000000000400000-0x0000000000444000-memory.dmp Nirsoft behavioral1/memory/896-70-0x0000000000400000-0x0000000000444000-memory.dmp Nirsoft behavioral1/memory/868-80-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral1/memory/868-81-0x000000000041211A-mapping.dmp Nirsoft behavioral1/memory/868-84-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral1/memory/868-85-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/860-57-0x0000000004790000-0x00000000047DC000-memory.dmp rezer0 -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
scan00001543.exeMSBuild.exedescription pid process target process PID 860 set thread context of 896 860 scan00001543.exe MSBuild.exe PID 896 set thread context of 868 896 MSBuild.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
scan00001543.exeMSBuild.exedescription pid process target process PID 860 wrote to memory of 1284 860 scan00001543.exe schtasks.exe PID 860 wrote to memory of 1284 860 scan00001543.exe schtasks.exe PID 860 wrote to memory of 1284 860 scan00001543.exe schtasks.exe PID 860 wrote to memory of 1284 860 scan00001543.exe schtasks.exe PID 860 wrote to memory of 896 860 scan00001543.exe MSBuild.exe PID 860 wrote to memory of 896 860 scan00001543.exe MSBuild.exe PID 860 wrote to memory of 896 860 scan00001543.exe MSBuild.exe PID 860 wrote to memory of 896 860 scan00001543.exe MSBuild.exe PID 860 wrote to memory of 896 860 scan00001543.exe MSBuild.exe PID 860 wrote to memory of 896 860 scan00001543.exe MSBuild.exe PID 860 wrote to memory of 896 860 scan00001543.exe MSBuild.exe PID 860 wrote to memory of 896 860 scan00001543.exe MSBuild.exe PID 860 wrote to memory of 896 860 scan00001543.exe MSBuild.exe PID 896 wrote to memory of 868 896 MSBuild.exe vbc.exe PID 896 wrote to memory of 868 896 MSBuild.exe vbc.exe PID 896 wrote to memory of 868 896 MSBuild.exe vbc.exe PID 896 wrote to memory of 868 896 MSBuild.exe vbc.exe PID 896 wrote to memory of 868 896 MSBuild.exe vbc.exe PID 896 wrote to memory of 868 896 MSBuild.exe vbc.exe PID 896 wrote to memory of 868 896 MSBuild.exe vbc.exe PID 896 wrote to memory of 868 896 MSBuild.exe vbc.exe PID 896 wrote to memory of 868 896 MSBuild.exe vbc.exe PID 896 wrote to memory of 868 896 MSBuild.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\scan00001543.exe"C:\Users\Admin\AppData\Local\Temp\scan00001543.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zICDBE" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4857.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp5EE3.tmp"3⤵
- Accesses Microsoft Outlook accounts
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp4857.tmpFilesize
1KB
MD5399697dfb7e41639173e5c3e5169f46e
SHA1563b498a80bb781a61eaaeed8800317bb0657c0d
SHA2562ec634dc5a86e78f1a0c491ad2ded8cce148ffa3b669e6c708f3849bde93fd32
SHA51231c874de762991b03b1abf30b07d2bd7601c0722991b92bab7dd47b532cc876ee89108d3487264d81b69e6367eaeb5f20c849a0ca68edea9f4eeaa02d04e65e4
-
memory/860-55-0x0000000076461000-0x0000000076463000-memory.dmpFilesize
8KB
-
memory/860-56-0x0000000000930000-0x0000000000938000-memory.dmpFilesize
32KB
-
memory/860-57-0x0000000004790000-0x00000000047DC000-memory.dmpFilesize
304KB
-
memory/860-54-0x0000000000980000-0x00000000009EA000-memory.dmpFilesize
424KB
-
memory/868-73-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/868-75-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/868-85-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/868-84-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/868-81-0x000000000041211A-mapping.dmp
-
memory/868-80-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/868-78-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/868-77-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/868-72-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/896-70-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/896-68-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/896-66-0x000000000043F95E-mapping.dmp
-
memory/896-60-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/896-65-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/896-64-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/896-63-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/896-61-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/1284-58-0x0000000000000000-mapping.dmp