Analysis

  • max time kernel
    39s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    04-06-2022 07:51

General

  • Target

    1138c002a361e5d7b6d39a02956689f3714864a27ae70a7064f8871204a47ed2.exe

  • Size

    738KB

  • MD5

    e933c74427cf653ac6e4cf3d0dd89b94

  • SHA1

    585b3e89b1e16b58497112ee5c7c75c9b601777d

  • SHA256

    1138c002a361e5d7b6d39a02956689f3714864a27ae70a7064f8871204a47ed2

  • SHA512

    952db528eaa6b1e88cd086062f66583c85d70b98a184d8ae26130f2b4be70db42b5a476b447078ddef174f7af9ee040edab8acef03310ff4e3a8426a89669dab

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Drops file in Drivers directory 2 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1138c002a361e5d7b6d39a02956689f3714864a27ae70a7064f8871204a47ed2.exe
    "C:\Users\Admin\AppData\Local\Temp\1138c002a361e5d7b6d39a02956689f3714864a27ae70a7064f8871204a47ed2.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    PID:1628

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Virtualization/Sandbox Evasion

1
T1497

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1628-54-0x0000000000400000-0x0000000000607000-memory.dmp
    Filesize

    2.0MB

  • memory/1628-55-0x0000000075FB1000-0x0000000075FB3000-memory.dmp
    Filesize

    8KB

  • memory/1628-56-0x0000000000400000-0x0000000000607000-memory.dmp
    Filesize

    2.0MB

  • memory/1628-57-0x0000000000400000-0x0000000000607000-memory.dmp
    Filesize

    2.0MB

  • memory/1628-58-0x0000000000400000-0x0000000000607000-memory.dmp
    Filesize

    2.0MB