Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2022 16:02
Static task
static1
Behavioral task
behavioral1
Sample
ETRANSFER_RECEIPT.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
ETRANSFER_RECEIPT.exe
Resource
win10v2004-20220721-en
General
-
Target
ETRANSFER_RECEIPT.exe
-
Size
300.0MB
-
MD5
8dac8b61bf8c23264873a3f3bee260f5
-
SHA1
ba581c38574794324ea714a48671fad7f2384dbe
-
SHA256
7e4a1f93d53d3962a913e000524344bdcccd6d36d0856b3df38df57d4a8e1df3
-
SHA512
65ef0b281583e1f8303ff470dc134d8d35ccc394521fd93294cd251220af501137b17d39af91829efe0191e395c2494e1652565895647bf04a46b56fe0eae163
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
olkij.exepid process 832 olkij.exe -
Processes:
resource yara_rule behavioral2/memory/608-137-0x00000000007C0000-0x0000000000BA4000-memory.dmp upx behavioral2/memory/608-138-0x00000000007C0000-0x0000000000BA4000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ETRANSFER_RECEIPT.exedescription pid process target process PID 1512 set thread context of 608 1512 ETRANSFER_RECEIPT.exe RegAsm.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2340 608 WerFault.exe RegAsm.exe 4840 608 WerFault.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
ETRANSFER_RECEIPT.execmd.exedescription pid process target process PID 1512 wrote to memory of 3100 1512 ETRANSFER_RECEIPT.exe cmd.exe PID 1512 wrote to memory of 3100 1512 ETRANSFER_RECEIPT.exe cmd.exe PID 1512 wrote to memory of 3100 1512 ETRANSFER_RECEIPT.exe cmd.exe PID 1512 wrote to memory of 5048 1512 ETRANSFER_RECEIPT.exe cmd.exe PID 1512 wrote to memory of 5048 1512 ETRANSFER_RECEIPT.exe cmd.exe PID 1512 wrote to memory of 5048 1512 ETRANSFER_RECEIPT.exe cmd.exe PID 1512 wrote to memory of 608 1512 ETRANSFER_RECEIPT.exe RegAsm.exe PID 1512 wrote to memory of 608 1512 ETRANSFER_RECEIPT.exe RegAsm.exe PID 1512 wrote to memory of 608 1512 ETRANSFER_RECEIPT.exe RegAsm.exe PID 3100 wrote to memory of 4788 3100 cmd.exe schtasks.exe PID 3100 wrote to memory of 4788 3100 cmd.exe schtasks.exe PID 3100 wrote to memory of 4788 3100 cmd.exe schtasks.exe PID 1512 wrote to memory of 608 1512 ETRANSFER_RECEIPT.exe RegAsm.exe PID 1512 wrote to memory of 608 1512 ETRANSFER_RECEIPT.exe RegAsm.exe PID 1512 wrote to memory of 608 1512 ETRANSFER_RECEIPT.exe RegAsm.exe PID 1512 wrote to memory of 608 1512 ETRANSFER_RECEIPT.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ETRANSFER_RECEIPT.exe"C:\Users\Admin\AppData\Local\Temp\ETRANSFER_RECEIPT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\olkij.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\olkij.exe'" /f3⤵
- Creates scheduled task(s)
PID:4788
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\ETRANSFER_RECEIPT.exe" "C:\Users\Admin\AppData\Local\Temp\olkij.exe"2⤵PID:5048
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 608 -s 5363⤵
- Program crash
PID:2340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 608 -s 5403⤵
- Program crash
PID:4840
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 608 -ip 6081⤵PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 608 -ip 6081⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\olkij.exeC:\Users\Admin\AppData\Local\Temp\olkij.exe1⤵
- Executes dropped EXE
PID:832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244.2MB
MD5967414dff5bc3973b524a11c7f75079d
SHA1c9394387e5a33313fe6c8e380241c6515daec327
SHA25621e0c8047c4c816e4489bef29bc70726f281630cd5f4f082e0362dfc31ac0e40
SHA51274171b41e0232df686a2c287e4c7db9f402d4e7f01419de0e8db35b5079c76ef6dad1be6f20e553a1d147d38cf74f840c61a669ea9519752091312fe22005c9d
-
Filesize
253.7MB
MD521aaf6fd1ec08e5b56c36ff63867bbc4
SHA1c4bc078d1833ca955ffe76ae9765a29870a1dc4a
SHA25669870c20213cd619202944c3e49af93e2f343de1c26b906871acbdc68dbac085
SHA5127e38a8ac63c7677c9a5a60d091489b4bd4dc4c793790e2d52dac8a4b973e7db7c49dc81f5e798b0aed10cb2043a62c64829fb047fa80e024de3efa7b015b547a