Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 03:23
Static task
static1
Behavioral task
behavioral1
Sample
disposable protective mask.exe
Resource
win7-20220414-en
General
-
Target
disposable protective mask.exe
-
Size
375KB
-
MD5
e18ddc52047f3d3147d94db4bc50cb63
-
SHA1
7d2f3257ce09b8fd7aad305cb23309348a4b9790
-
SHA256
369e06999d4475ecc6e01a440ac20bebb744dbbf14b609c002f65379403f4be7
-
SHA512
f0ebd0c7a72e6419b37a607ce282acebecec2c9c80356f35fddaaf3f0ec8edac0cd6b00d81ad0a61a377eb70e7c5a9bcca70cf7088232d74c79f7bea8bf4cf61
Malware Config
Extracted
asyncrat
0.5.6D
HARDHARD
185.165.153.215:6606
uqeolevmck
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
Processes:
resource yara_rule behavioral1/memory/1808-56-0x00000000005B0000-0x00000000005B8000-memory.dmp coreentity -
Async RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1256-61-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1256-62-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1256-64-0x000000000040C5FE-mapping.dmp asyncrat behavioral1/memory/1256-63-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1256-66-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1256-68-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/1808-57-0x0000000000D40000-0x0000000000D5A000-memory.dmp rezer0 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
disposable protective mask.exedescription pid process target process PID 1808 set thread context of 1256 1808 disposable protective mask.exe disposable protective mask.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
disposable protective mask.exepid process 1808 disposable protective mask.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
disposable protective mask.exedescription pid process Token: SeDebugPrivilege 1808 disposable protective mask.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
disposable protective mask.exedescription pid process target process PID 1808 wrote to memory of 1256 1808 disposable protective mask.exe disposable protective mask.exe PID 1808 wrote to memory of 1256 1808 disposable protective mask.exe disposable protective mask.exe PID 1808 wrote to memory of 1256 1808 disposable protective mask.exe disposable protective mask.exe PID 1808 wrote to memory of 1256 1808 disposable protective mask.exe disposable protective mask.exe PID 1808 wrote to memory of 1256 1808 disposable protective mask.exe disposable protective mask.exe PID 1808 wrote to memory of 1256 1808 disposable protective mask.exe disposable protective mask.exe PID 1808 wrote to memory of 1256 1808 disposable protective mask.exe disposable protective mask.exe PID 1808 wrote to memory of 1256 1808 disposable protective mask.exe disposable protective mask.exe PID 1808 wrote to memory of 1256 1808 disposable protective mask.exe disposable protective mask.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\disposable protective mask.exe"C:\Users\Admin\AppData\Local\Temp\disposable protective mask.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\disposable protective mask.exe"{path}"2⤵PID:1256
-