Analysis

  • max time kernel
    85s
  • max time network
    127s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    25-11-2021 16:41

General

  • Target

    70aed0f648b35cc5ed91c375f98e2c62cbb41777a3c8dc13d6bb05782dcd8fc4.exe

  • Size

    4.3MB

  • MD5

    df6ae2867d29e6032cf7514fb264ad25

  • SHA1

    866b087fdb3cfdb0114bb9514c9138b60cc9d3cf

  • SHA256

    70aed0f648b35cc5ed91c375f98e2c62cbb41777a3c8dc13d6bb05782dcd8fc4

  • SHA512

    57b882d8d9e4832d406de476b1a054aeb1c42bdeccdb6a46631f8feaa66926f86f0452bdcd6cb735826b031b941e55039623947cc151bb11d7100e81aa2d1186

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Program crash 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70aed0f648b35cc5ed91c375f98e2c62cbb41777a3c8dc13d6bb05782dcd8fc4.exe
    "C:\Users\Admin\AppData\Local\Temp\70aed0f648b35cc5ed91c375f98e2c62cbb41777a3c8dc13d6bb05782dcd8fc4.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2524
    • C:\Users\Admin\AppData\Local\Temp\70aed0f648b35cc5ed91c375f98e2c62cbb41777a3c8dc13d6bb05782dcd8fc4.exe
      "C:\Users\Admin\AppData\Local\Temp\70aed0f648b35cc5ed91c375f98e2c62cbb41777a3c8dc13d6bb05782dcd8fc4.exe"
      2⤵
      • Modifies data under HKEY_USERS
      PID:932
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 752
        3⤵
        • Program crash
        PID:1552

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/932-121-0x0000000003E65000-0x0000000004274000-memory.dmp
    Filesize

    4.1MB

  • memory/932-122-0x0000000000400000-0x0000000002000000-memory.dmp
    Filesize

    28.0MB

  • memory/2524-118-0x0000000003FA6000-0x00000000043B5000-memory.dmp
    Filesize

    4.1MB

  • memory/2524-120-0x0000000000400000-0x0000000002000000-memory.dmp
    Filesize

    28.0MB

  • memory/2524-119-0x00000000043C0000-0x0000000004C62000-memory.dmp
    Filesize

    8.6MB