Analysis
-
max time kernel
151s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2022 16:16
Static task
static1
Behavioral task
behavioral1
Sample
Interac-e-Transfer-Receipt.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
Interac-e-Transfer-Receipt.exe
Resource
win10v2004-20220722-en
General
-
Target
Interac-e-Transfer-Receipt.exe
-
Size
300.0MB
-
MD5
8dac8b61bf8c23264873a3f3bee260f5
-
SHA1
ba581c38574794324ea714a48671fad7f2384dbe
-
SHA256
7e4a1f93d53d3962a913e000524344bdcccd6d36d0856b3df38df57d4a8e1df3
-
SHA512
65ef0b281583e1f8303ff470dc134d8d35ccc394521fd93294cd251220af501137b17d39af91829efe0191e395c2494e1652565895647bf04a46b56fe0eae163
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
olkij.exepid process 2860 olkij.exe -
Processes:
resource yara_rule behavioral2/memory/1192-139-0x0000000000B00000-0x0000000000EE4000-memory.dmp upx behavioral2/memory/1192-140-0x0000000000B00000-0x0000000000EE4000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Interac-e-Transfer-Receipt.exedescription pid process target process PID 868 set thread context of 1192 868 Interac-e-Transfer-Receipt.exe RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1736 1192 WerFault.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Interac-e-Transfer-Receipt.execmd.exedescription pid process target process PID 868 wrote to memory of 2300 868 Interac-e-Transfer-Receipt.exe cmd.exe PID 868 wrote to memory of 2300 868 Interac-e-Transfer-Receipt.exe cmd.exe PID 868 wrote to memory of 2300 868 Interac-e-Transfer-Receipt.exe cmd.exe PID 2300 wrote to memory of 4660 2300 cmd.exe schtasks.exe PID 2300 wrote to memory of 4660 2300 cmd.exe schtasks.exe PID 2300 wrote to memory of 4660 2300 cmd.exe schtasks.exe PID 868 wrote to memory of 3460 868 Interac-e-Transfer-Receipt.exe cmd.exe PID 868 wrote to memory of 3460 868 Interac-e-Transfer-Receipt.exe cmd.exe PID 868 wrote to memory of 3460 868 Interac-e-Transfer-Receipt.exe cmd.exe PID 868 wrote to memory of 1192 868 Interac-e-Transfer-Receipt.exe RegAsm.exe PID 868 wrote to memory of 1192 868 Interac-e-Transfer-Receipt.exe RegAsm.exe PID 868 wrote to memory of 1192 868 Interac-e-Transfer-Receipt.exe RegAsm.exe PID 868 wrote to memory of 1192 868 Interac-e-Transfer-Receipt.exe RegAsm.exe PID 868 wrote to memory of 1192 868 Interac-e-Transfer-Receipt.exe RegAsm.exe PID 868 wrote to memory of 1192 868 Interac-e-Transfer-Receipt.exe RegAsm.exe PID 868 wrote to memory of 1192 868 Interac-e-Transfer-Receipt.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Interac-e-Transfer-Receipt.exe"C:\Users\Admin\AppData\Local\Temp\Interac-e-Transfer-Receipt.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\olkij.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\olkij.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\Interac-e-Transfer-Receipt.exe" "C:\Users\Admin\AppData\Local\Temp\olkij.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 5403⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1192 -ip 11921⤵
-
C:\Users\Admin\AppData\Local\Temp\olkij.exeC:\Users\Admin\AppData\Local\Temp\olkij.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\olkij.exeFilesize
300.0MB
MD58dac8b61bf8c23264873a3f3bee260f5
SHA1ba581c38574794324ea714a48671fad7f2384dbe
SHA2567e4a1f93d53d3962a913e000524344bdcccd6d36d0856b3df38df57d4a8e1df3
SHA51265ef0b281583e1f8303ff470dc134d8d35ccc394521fd93294cd251220af501137b17d39af91829efe0191e395c2494e1652565895647bf04a46b56fe0eae163
-
C:\Users\Admin\AppData\Local\Temp\olkij.exeFilesize
300.0MB
MD58dac8b61bf8c23264873a3f3bee260f5
SHA1ba581c38574794324ea714a48671fad7f2384dbe
SHA2567e4a1f93d53d3962a913e000524344bdcccd6d36d0856b3df38df57d4a8e1df3
SHA51265ef0b281583e1f8303ff470dc134d8d35ccc394521fd93294cd251220af501137b17d39af91829efe0191e395c2494e1652565895647bf04a46b56fe0eae163
-
memory/868-132-0x0000000000800000-0x000000000098A000-memory.dmpFilesize
1.5MB
-
memory/868-133-0x0000000005A50000-0x0000000005FF4000-memory.dmpFilesize
5.6MB
-
memory/1192-137-0x0000000000000000-mapping.dmp
-
memory/1192-139-0x0000000000B00000-0x0000000000EE4000-memory.dmpFilesize
3.9MB
-
memory/1192-140-0x0000000000B00000-0x0000000000EE4000-memory.dmpFilesize
3.9MB
-
memory/2300-134-0x0000000000000000-mapping.dmp
-
memory/3460-136-0x0000000000000000-mapping.dmp
-
memory/4660-135-0x0000000000000000-mapping.dmp