Analysis
-
max time kernel
185s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 15:01
Static task
static1
Behavioral task
behavioral1
Sample
7-7811296177.zip
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7-7811296177.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
8198d59461dfb08d7a350333d1459231543c6a29e8db7c31fd14850868a75a38.iso
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
8198d59461dfb08d7a350333d1459231543c6a29e8db7c31fd14850868a75a38.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
NAMUJS_ETRANSFER_RECEIPT.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
NAMUJS_ETRANSFER_RECEIPT.exe
Resource
win10v2004-20220812-en
General
-
Target
NAMUJS_ETRANSFER_RECEIPT.exe
-
Size
300.0MB
-
MD5
aa16895db009a8b646bb9c51f9b51c58
-
SHA1
014b372bc0620fb1173679abb7c189d0464ce208
-
SHA256
72656944adc7c9dabbc263d8a1c7f79ff6d0b6a3b06a11f88b741977c5e4f751
-
SHA512
4411e718c124059044ab7fbe54f3fefa76c9d5cd2263c4214c70a498d681f87f2804aef0e8c94b630fadf9470d5e804702349ab21fafa512a368d90424d8e29b
-
SSDEEP
24576:GzEo/IReVjVaXcqqza/KkJVWpcpr8lCGyi2FBGbZLipIjJ7Fb5DIoN3EtO:GziCYXKzyKkJM8r8lXyEGpIjJ73jtEt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
olkij.exepid process 908 olkij.exe -
Processes:
resource yara_rule behavioral6/memory/4044-139-0x0000000000700000-0x0000000000AE4000-memory.dmp upx behavioral6/memory/4044-140-0x0000000000700000-0x0000000000AE4000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
NAMUJS_ETRANSFER_RECEIPT.exedescription pid process target process PID 4808 set thread context of 4044 4808 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1260 4044 WerFault.exe RegAsm.exe 2936 4044 WerFault.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4460 schtasks.exe 4204 schtasks.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
NAMUJS_ETRANSFER_RECEIPT.execmd.exeolkij.execmd.exedescription pid process target process PID 4808 wrote to memory of 1940 4808 NAMUJS_ETRANSFER_RECEIPT.exe cmd.exe PID 4808 wrote to memory of 1940 4808 NAMUJS_ETRANSFER_RECEIPT.exe cmd.exe PID 4808 wrote to memory of 1940 4808 NAMUJS_ETRANSFER_RECEIPT.exe cmd.exe PID 4808 wrote to memory of 1532 4808 NAMUJS_ETRANSFER_RECEIPT.exe cmd.exe PID 4808 wrote to memory of 1532 4808 NAMUJS_ETRANSFER_RECEIPT.exe cmd.exe PID 4808 wrote to memory of 1532 4808 NAMUJS_ETRANSFER_RECEIPT.exe cmd.exe PID 1940 wrote to memory of 4460 1940 cmd.exe schtasks.exe PID 1940 wrote to memory of 4460 1940 cmd.exe schtasks.exe PID 1940 wrote to memory of 4460 1940 cmd.exe schtasks.exe PID 4808 wrote to memory of 4044 4808 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 4808 wrote to memory of 4044 4808 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 4808 wrote to memory of 4044 4808 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 4808 wrote to memory of 4044 4808 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 4808 wrote to memory of 4044 4808 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 4808 wrote to memory of 4044 4808 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 4808 wrote to memory of 4044 4808 NAMUJS_ETRANSFER_RECEIPT.exe RegAsm.exe PID 908 wrote to memory of 396 908 olkij.exe cmd.exe PID 908 wrote to memory of 396 908 olkij.exe cmd.exe PID 908 wrote to memory of 396 908 olkij.exe cmd.exe PID 908 wrote to memory of 4628 908 olkij.exe cmd.exe PID 908 wrote to memory of 4628 908 olkij.exe cmd.exe PID 908 wrote to memory of 4628 908 olkij.exe cmd.exe PID 396 wrote to memory of 4204 396 cmd.exe schtasks.exe PID 396 wrote to memory of 4204 396 cmd.exe schtasks.exe PID 396 wrote to memory of 4204 396 cmd.exe schtasks.exe PID 908 wrote to memory of 1960 908 olkij.exe RegAsm.exe PID 908 wrote to memory of 1960 908 olkij.exe RegAsm.exe PID 908 wrote to memory of 1960 908 olkij.exe RegAsm.exe PID 908 wrote to memory of 1960 908 olkij.exe RegAsm.exe PID 908 wrote to memory of 1960 908 olkij.exe RegAsm.exe PID 908 wrote to memory of 1960 908 olkij.exe RegAsm.exe PID 908 wrote to memory of 1960 908 olkij.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NAMUJS_ETRANSFER_RECEIPT.exe"C:\Users\Admin\AppData\Local\Temp\NAMUJS_ETRANSFER_RECEIPT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\olkij.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\olkij.exe'" /f3⤵
- Creates scheduled task(s)
PID:4460 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\NAMUJS_ETRANSFER_RECEIPT.exe" "C:\Users\Admin\AppData\Local\Temp\olkij.exe"2⤵PID:1532
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 5723⤵
- Program crash
PID:1260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 6203⤵
- Program crash
PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4044 -ip 40441⤵PID:1344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4044 -ip 40441⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\olkij.exeC:\Users\Admin\AppData\Local\Temp\olkij.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\olkij.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafdfnasia" /tr "'C:\Users\Admin\AppData\Local\Temp\olkij.exe'" /f3⤵
- Creates scheduled task(s)
PID:4204 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\olkij.exe" "C:\Users\Admin\AppData\Local\Temp\olkij.exe"2⤵PID:4628
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300.0MB
MD5aa16895db009a8b646bb9c51f9b51c58
SHA1014b372bc0620fb1173679abb7c189d0464ce208
SHA25672656944adc7c9dabbc263d8a1c7f79ff6d0b6a3b06a11f88b741977c5e4f751
SHA5124411e718c124059044ab7fbe54f3fefa76c9d5cd2263c4214c70a498d681f87f2804aef0e8c94b630fadf9470d5e804702349ab21fafa512a368d90424d8e29b
-
Filesize
300.0MB
MD5aa16895db009a8b646bb9c51f9b51c58
SHA1014b372bc0620fb1173679abb7c189d0464ce208
SHA25672656944adc7c9dabbc263d8a1c7f79ff6d0b6a3b06a11f88b741977c5e4f751
SHA5124411e718c124059044ab7fbe54f3fefa76c9d5cd2263c4214c70a498d681f87f2804aef0e8c94b630fadf9470d5e804702349ab21fafa512a368d90424d8e29b