Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 11:56
Static task
static1
Behavioral task
behavioral1
Sample
halkbank,pdf.exe
Resource
win7-20220414-en
General
-
Target
halkbank,pdf.exe
-
Size
505KB
-
MD5
c2ae801ef06c2ccb81a80b570d37083d
-
SHA1
802f68b12a3c4b574a7f75f24d43e41e06e105c0
-
SHA256
a9352a90a15c864ae05d1d1138aff00094883dc44afffc471e837e46fe3eb24e
-
SHA512
700ef3edbdaa64de7887cb9edfbf40006a704ab278a33aa02b989e619cf6337568144bf3b0c2f09e1ce1fb3dd80ed406625510f6ea02dd3c1df7127ec8297035
Malware Config
Extracted
nanocore
1.2.2.0
jfncghc.ddns.net:4040
127.0.0.1:4040
e2279684-e454-4079-806c-610ddaafcce7
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2020-03-28T14:53:11.033143636Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
4040
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
e2279684-e454-4079-806c-610ddaafcce7
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
jfncghc.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/784-57-0x0000000000B20000-0x0000000000B60000-memory.dmp rezer0 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
halkbank,pdf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DSL Service = "C:\\Program Files (x86)\\DSL Service\\dslsvc.exe" halkbank,pdf.exe -
Processes:
halkbank,pdf.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA halkbank,pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
halkbank,pdf.exedescription pid process target process PID 784 set thread context of 1936 784 halkbank,pdf.exe halkbank,pdf.exe -
Drops file in Program Files directory 2 IoCs
Processes:
halkbank,pdf.exedescription ioc process File created C:\Program Files (x86)\DSL Service\dslsvc.exe halkbank,pdf.exe File opened for modification C:\Program Files (x86)\DSL Service\dslsvc.exe halkbank,pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
halkbank,pdf.exepid process 1936 halkbank,pdf.exe 1936 halkbank,pdf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
halkbank,pdf.exepid process 1936 halkbank,pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
halkbank,pdf.exedescription pid process Token: SeDebugPrivilege 1936 halkbank,pdf.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
halkbank,pdf.exedescription pid process target process PID 784 wrote to memory of 1880 784 halkbank,pdf.exe schtasks.exe PID 784 wrote to memory of 1880 784 halkbank,pdf.exe schtasks.exe PID 784 wrote to memory of 1880 784 halkbank,pdf.exe schtasks.exe PID 784 wrote to memory of 1880 784 halkbank,pdf.exe schtasks.exe PID 784 wrote to memory of 1936 784 halkbank,pdf.exe halkbank,pdf.exe PID 784 wrote to memory of 1936 784 halkbank,pdf.exe halkbank,pdf.exe PID 784 wrote to memory of 1936 784 halkbank,pdf.exe halkbank,pdf.exe PID 784 wrote to memory of 1936 784 halkbank,pdf.exe halkbank,pdf.exe PID 784 wrote to memory of 1936 784 halkbank,pdf.exe halkbank,pdf.exe PID 784 wrote to memory of 1936 784 halkbank,pdf.exe halkbank,pdf.exe PID 784 wrote to memory of 1936 784 halkbank,pdf.exe halkbank,pdf.exe PID 784 wrote to memory of 1936 784 halkbank,pdf.exe halkbank,pdf.exe PID 784 wrote to memory of 1936 784 halkbank,pdf.exe halkbank,pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\halkbank,pdf.exe"C:\Users\Admin\AppData\Local\Temp\halkbank,pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\COyyrcBB" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1278.tmp"2⤵
- Creates scheduled task(s)
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\halkbank,pdf.exe"C:\Users\Admin\AppData\Local\Temp\halkbank,pdf.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD500fe167e58eba6b9ffe00f91ff42e5ee
SHA1678ce3c6cdc033db51b2269be9cab131ff79b530
SHA2562b3b681fca26750412ff9cf299680d6c77b366e467fb34c234205495173c3ea9
SHA512bd1be4caad858cf7509709302e06818eae9dea5260185f356daf547fed9b1c76ab380686d266c4381f6cb789db50a8cd8bc4cee5bcdb23f26a5987e3d9389895