Analysis
-
max time kernel
148s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 12:21
Static task
static1
Behavioral task
behavioral1
Sample
p0flf49bEs68ze7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
p0flf49bEs68ze7.exe
Resource
win10v2004-20220414-en
General
-
Target
p0flf49bEs68ze7.exe
-
Size
736KB
-
MD5
f86c5e35abb842290ce1773b6a4e7d0f
-
SHA1
b14fc3de5165c84c5dac9e39e6c0695710fb3549
-
SHA256
76933bfe9afdf8d266352155f09995acadcab23345fabe2518d5bf15d45c9cd4
-
SHA512
aad5cfbe0de8979deb1800f90467fe7f8426889ff3ad836511c04985d3c1eb51138e94f0c209dcd9663739bb677c0f4e28257d582972df6c0fabb6b4efb6622c
Malware Config
Signatures
-
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/1016-57-0x0000000005E80000-0x0000000005F16000-memory.dmp rezer0 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
p0flf49bEs68ze7.exedescription pid process target process PID 1016 set thread context of 584 1016 p0flf49bEs68ze7.exe p0flf49bEs68ze7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
p0flf49bEs68ze7.exedescription pid process target process PID 1016 wrote to memory of 1776 1016 p0flf49bEs68ze7.exe schtasks.exe PID 1016 wrote to memory of 1776 1016 p0flf49bEs68ze7.exe schtasks.exe PID 1016 wrote to memory of 1776 1016 p0flf49bEs68ze7.exe schtasks.exe PID 1016 wrote to memory of 1776 1016 p0flf49bEs68ze7.exe schtasks.exe PID 1016 wrote to memory of 584 1016 p0flf49bEs68ze7.exe p0flf49bEs68ze7.exe PID 1016 wrote to memory of 584 1016 p0flf49bEs68ze7.exe p0flf49bEs68ze7.exe PID 1016 wrote to memory of 584 1016 p0flf49bEs68ze7.exe p0flf49bEs68ze7.exe PID 1016 wrote to memory of 584 1016 p0flf49bEs68ze7.exe p0flf49bEs68ze7.exe PID 1016 wrote to memory of 584 1016 p0flf49bEs68ze7.exe p0flf49bEs68ze7.exe PID 1016 wrote to memory of 584 1016 p0flf49bEs68ze7.exe p0flf49bEs68ze7.exe PID 1016 wrote to memory of 584 1016 p0flf49bEs68ze7.exe p0flf49bEs68ze7.exe PID 1016 wrote to memory of 584 1016 p0flf49bEs68ze7.exe p0flf49bEs68ze7.exe PID 1016 wrote to memory of 584 1016 p0flf49bEs68ze7.exe p0flf49bEs68ze7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\p0flf49bEs68ze7.exe"C:\Users\Admin\AppData\Local\Temp\p0flf49bEs68ze7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JYFAGrRGPfsz" /XML "C:\Users\Admin\AppData\Local\Temp\tmp50FE.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\p0flf49bEs68ze7.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp50FE.tmpFilesize
1KB
MD598ee8df28e311145dc3a4446e04a2571
SHA145c943cefa65a0a8525a4d3ec7ee24f16e9a79ea
SHA25622c6868b92aa3f7be296268d78ec9dd8b77969b7ec287cdb31f150e70684ec55
SHA5127dce05823df4a55671ac4f9001ad3c8db23e44a64888f7cf3c9b035ac0c0c29b189429b58195f9b596e92b862a779459b586d7b381f2f7e2dae85ebdbfe9b21c
-
memory/584-64-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/584-66-0x000000000048952E-mapping.dmp
-
memory/584-71-0x00000000006F0000-0x0000000000734000-memory.dmpFilesize
272KB
-
memory/584-70-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/584-68-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/584-60-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/584-61-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/584-63-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/584-65-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1016-54-0x0000000000820000-0x00000000008DE000-memory.dmpFilesize
760KB
-
memory/1016-56-0x0000000000580000-0x0000000000590000-memory.dmpFilesize
64KB
-
memory/1016-55-0x0000000075F61000-0x0000000075F63000-memory.dmpFilesize
8KB
-
memory/1016-57-0x0000000005E80000-0x0000000005F16000-memory.dmpFilesize
600KB
-
memory/1776-58-0x0000000000000000-mapping.dmp