Analysis
-
max time kernel
23s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-06-2022 08:44
Static task
static1
Behavioral task
behavioral1
Sample
1127d36455c5db612941bf6460ec52053d0c4348b125914540b5900992ebed48.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1127d36455c5db612941bf6460ec52053d0c4348b125914540b5900992ebed48.exe
Resource
win10v2004-20220414-en
General
-
Target
1127d36455c5db612941bf6460ec52053d0c4348b125914540b5900992ebed48.exe
-
Size
577KB
-
MD5
08968264009fc1b172e66c0e7e0b5331
-
SHA1
15eb75544e41e7894dd263651167af9b63bc2632
-
SHA256
1127d36455c5db612941bf6460ec52053d0c4348b125914540b5900992ebed48
-
SHA512
18f6231f56da3aa63120c5005760f7be18f47e61ecbfaf37c27242b12b91461b55d0e1e992050baf80035fcd8482f742c25eff42b580d1a74a2668b2e9b157a3
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
1127d36455c5db612941bf6460ec52053d0c4348b125914540b5900992ebed48.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Wine 1127d36455c5db612941bf6460ec52053d0c4348b125914540b5900992ebed48.exe -
Drops file in System32 directory 2 IoCs
Processes:
1127d36455c5db612941bf6460ec52053d0c4348b125914540b5900992ebed48.exedescription ioc process File created C:\Windows\SysWOW64\wbem\wmisrsvc.exe 1127d36455c5db612941bf6460ec52053d0c4348b125914540b5900992ebed48.exe File opened for modification C:\Windows\SysWOW64\wbem\wmisrsvc.exe 1127d36455c5db612941bf6460ec52053d0c4348b125914540b5900992ebed48.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
1127d36455c5db612941bf6460ec52053d0c4348b125914540b5900992ebed48.exepid process 4120 1127d36455c5db612941bf6460ec52053d0c4348b125914540b5900992ebed48.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1127d36455c5db612941bf6460ec52053d0c4348b125914540b5900992ebed48.exepid process 4120 1127d36455c5db612941bf6460ec52053d0c4348b125914540b5900992ebed48.exe 4120 1127d36455c5db612941bf6460ec52053d0c4348b125914540b5900992ebed48.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1127d36455c5db612941bf6460ec52053d0c4348b125914540b5900992ebed48.exe"C:\Users\Admin\AppData\Local\Temp\1127d36455c5db612941bf6460ec52053d0c4348b125914540b5900992ebed48.exe"1⤵
- Identifies Wine through registry keys
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses