Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 16:16
Static task
static1
Behavioral task
behavioral1
Sample
NAMUJS_ETRANSFER_RECEIPT.exe
Resource
win7-20220812-en
General
-
Target
NAMUJS_ETRANSFER_RECEIPT.exe
-
Size
300.0MB
-
MD5
aa16895db009a8b646bb9c51f9b51c58
-
SHA1
014b372bc0620fb1173679abb7c189d0464ce208
-
SHA256
72656944adc7c9dabbc263d8a1c7f79ff6d0b6a3b06a11f88b741977c5e4f751
-
SHA512
4411e718c124059044ab7fbe54f3fefa76c9d5cd2263c4214c70a498d681f87f2804aef0e8c94b630fadf9470d5e804702349ab21fafa512a368d90424d8e29b
-
SSDEEP
24576:GzEo/IReVjVaXcqqza/KkJVWpcpr8lCGyi2FBGbZLipIjJ7Fb5DIoN3EtO:GziCYXKzyKkJM8r8lXyEGpIjJ73jtEt
Malware Config
Extracted
bitrat
1.38
bitrat9300.duckdns.org:9300
-
communication_password
e10adc3949ba59abbe56e057f20f883e
-
tor_process
tor
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
olkij.exepid process 1836 olkij.exe -
Processes:
resource yara_rule behavioral1/memory/1436-61-0x0000000000480000-0x0000000000864000-memory.dmp upx behavioral1/memory/1436-65-0x0000000000480000-0x0000000000864000-memory.dmp upx behavioral1/memory/1436-64-0x0000000000480000-0x0000000000864000-memory.dmp upx behavioral1/memory/1436-68-0x0000000000480000-0x0000000000864000-memory.dmp upx behavioral1/memory/1436-70-0x0000000000480000-0x0000000000864000-memory.dmp upx behavioral1/memory/1436-71-0x0000000000480000-0x0000000000864000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
RegAsm.exepid process 1436 RegAsm.exe 1436 RegAsm.exe 1436 RegAsm.exe 1436 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
NAMUJS_ETRANSFER_RECEIPT.exedescription pid process target process PID 1760 set thread context of 1436 1760 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 1436 RegAsm.exe Token: SeShutdownPrivilege 1436 RegAsm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
RegAsm.exepid process 1436 RegAsm.exe 1436 RegAsm.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
NAMUJS_ETRANSFER_RECEIPT.execmd.exetaskeng.exedescription pid process target process PID 1760 wrote to memory of 980 1760 NAMUJS_ETRANSFER_RECEIPT.exe cmd.exe PID 1760 wrote to memory of 980 1760 NAMUJS_ETRANSFER_RECEIPT.exe cmd.exe PID 1760 wrote to memory of 980 1760 NAMUJS_ETRANSFER_RECEIPT.exe cmd.exe PID 1760 wrote to memory of 980 1760 NAMUJS_ETRANSFER_RECEIPT.exe cmd.exe PID 1760 wrote to memory of 1488 1760 NAMUJS_ETRANSFER_RECEIPT.exe cmd.exe PID 1760 wrote to memory of 1488 1760 NAMUJS_ETRANSFER_RECEIPT.exe cmd.exe PID 1760 wrote to memory of 1488 1760 NAMUJS_ETRANSFER_RECEIPT.exe cmd.exe PID 1760 wrote to memory of 1488 1760 NAMUJS_ETRANSFER_RECEIPT.exe cmd.exe PID 980 wrote to memory of 1540 980 cmd.exe schtasks.exe PID 980 wrote to memory of 1540 980 cmd.exe schtasks.exe PID 980 wrote to memory of 1540 980 cmd.exe schtasks.exe PID 980 wrote to memory of 1540 980 cmd.exe schtasks.exe PID 1760 wrote to memory of 1436 1760 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1760 wrote to memory of 1436 1760 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1760 wrote to memory of 1436 1760 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1760 wrote to memory of 1436 1760 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1760 wrote to memory of 1436 1760 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1760 wrote to memory of 1436 1760 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1760 wrote to memory of 1436 1760 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1760 wrote to memory of 1436 1760 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1760 wrote to memory of 1436 1760 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1760 wrote to memory of 1436 1760 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 1760 wrote to memory of 1436 1760 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 740 wrote to memory of 1836 740 taskeng.exe olkij.exe PID 740 wrote to memory of 1836 740 taskeng.exe olkij.exe PID 740 wrote to memory of 1836 740 taskeng.exe olkij.exe PID 740 wrote to memory of 1836 740 taskeng.exe olkij.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NAMUJS_ETRANSFER_RECEIPT.exe"C:\Users\Admin\AppData\Local\Temp\NAMUJS_ETRANSFER_RECEIPT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\olkij.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\olkij.exe'" /f3⤵
- Creates scheduled task(s)
PID:1540 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\NAMUJS_ETRANSFER_RECEIPT.exe" "C:\Users\Admin\AppData\Local\Temp\olkij.exe"2⤵PID:1488
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1436
-
C:\Windows\system32\taskeng.exetaskeng.exe {F413D0A9-B06B-4762-85BB-5A69CB86818C} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\olkij.exeC:\Users\Admin\AppData\Local\Temp\olkij.exe2⤵
- Executes dropped EXE
PID:1836
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300.0MB
MD5aa16895db009a8b646bb9c51f9b51c58
SHA1014b372bc0620fb1173679abb7c189d0464ce208
SHA25672656944adc7c9dabbc263d8a1c7f79ff6d0b6a3b06a11f88b741977c5e4f751
SHA5124411e718c124059044ab7fbe54f3fefa76c9d5cd2263c4214c70a498d681f87f2804aef0e8c94b630fadf9470d5e804702349ab21fafa512a368d90424d8e29b
-
Filesize
300.0MB
MD5aa16895db009a8b646bb9c51f9b51c58
SHA1014b372bc0620fb1173679abb7c189d0464ce208
SHA25672656944adc7c9dabbc263d8a1c7f79ff6d0b6a3b06a11f88b741977c5e4f751
SHA5124411e718c124059044ab7fbe54f3fefa76c9d5cd2263c4214c70a498d681f87f2804aef0e8c94b630fadf9470d5e804702349ab21fafa512a368d90424d8e29b