Analysis
-
max time kernel
40s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:57
Static task
static1
Behavioral task
behavioral1
Sample
00000056431.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
00000056431.exe
Resource
win10v2004-20220414-en
General
-
Target
00000056431.exe
-
Size
462KB
-
MD5
84f834b868b0e17a6d1ce5b7ee4e04be
-
SHA1
8d4f5fe04c16574d22a6a17d3f2d751d817293dd
-
SHA256
6fb90df91c05a8ded30de9ef0a21bb41e2c4f1ee3c9ef814877feb500cf8cac6
-
SHA512
84154d9717741df46e7fb257e092e11a3250024f0b422ec3e497068c6dfd85be07ea566d04308fbd6b62c51317165185690512a938346cb43dddc39291e3e3ec
Malware Config
Signatures
-
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
Processes:
resource yara_rule behavioral1/memory/316-56-0x00000000003A0000-0x00000000003A8000-memory.dmp coreentity -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/316-57-0x00000000040B0000-0x0000000004108000-memory.dmp rezer0 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
00000056431.exepid process 316 00000056431.exe 316 00000056431.exe 316 00000056431.exe 316 00000056431.exe 316 00000056431.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
00000056431.exedescription pid process Token: SeDebugPrivilege 316 00000056431.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
00000056431.exedescription pid process target process PID 316 wrote to memory of 1976 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 1976 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 1976 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 1976 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 892 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 892 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 892 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 892 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 1652 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 1652 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 1652 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 1652 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 1860 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 1860 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 1860 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 1860 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 1716 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 1716 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 1716 316 00000056431.exe 00000056431.exe PID 316 wrote to memory of 1716 316 00000056431.exe 00000056431.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\00000056431.exe"C:\Users\Admin\AppData\Local\Temp\00000056431.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\00000056431.exe"{path}"2⤵PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\00000056431.exe"{path}"2⤵PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\00000056431.exe"{path}"2⤵PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\00000056431.exe"{path}"2⤵PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\00000056431.exe"{path}"2⤵PID:1716
-