Analysis

  • max time kernel
    151s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    04-06-2022 08:50

General

  • Target

    112626c80723081de153623493adad8068d5b27497edf13dab5ed905bc3368e8.exe

  • Size

    48KB

  • MD5

    3a59d45ff99888ef3eda7595c10e295a

  • SHA1

    2e41ca17e9549244d314fd287aeb159748d261f7

  • SHA256

    112626c80723081de153623493adad8068d5b27497edf13dab5ed905bc3368e8

  • SHA512

    890fb4cc5c73b84f52a2b3f1fc125200a5e1eee4aec39739814e923ad53f7c5397d0655a30a87d3b990482fae27930389d9663d9121e7b2008bd691ee8f18d92

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • suricata: ET MALWARE DNS Reply Sinkhole - Microsoft - 199.2.137.0/24

    suricata: ET MALWARE DNS Reply Sinkhole - Microsoft - 199.2.137.0/24

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\112626c80723081de153623493adad8068d5b27497edf13dab5ed905bc3368e8.exe
    "C:\Users\Admin\AppData\Local\Temp\112626c80723081de153623493adad8068d5b27497edf13dab5ed905bc3368e8.exe"
    1⤵
    • Adds policy Run key to start application
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4100
    • C:\Windows\sadrive32.exe
      "C:\Windows\sadrive32.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:4424

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\sadrive32.exe
    Filesize

    48KB

    MD5

    3a59d45ff99888ef3eda7595c10e295a

    SHA1

    2e41ca17e9549244d314fd287aeb159748d261f7

    SHA256

    112626c80723081de153623493adad8068d5b27497edf13dab5ed905bc3368e8

    SHA512

    890fb4cc5c73b84f52a2b3f1fc125200a5e1eee4aec39739814e923ad53f7c5397d0655a30a87d3b990482fae27930389d9663d9121e7b2008bd691ee8f18d92

  • C:\Windows\sadrive32.exe
    Filesize

    48KB

    MD5

    3a59d45ff99888ef3eda7595c10e295a

    SHA1

    2e41ca17e9549244d314fd287aeb159748d261f7

    SHA256

    112626c80723081de153623493adad8068d5b27497edf13dab5ed905bc3368e8

    SHA512

    890fb4cc5c73b84f52a2b3f1fc125200a5e1eee4aec39739814e923ad53f7c5397d0655a30a87d3b990482fae27930389d9663d9121e7b2008bd691ee8f18d92

  • memory/4100-130-0x00000000001D0000-0x00000000001D8000-memory.dmp
    Filesize

    32KB

  • memory/4100-131-0x0000000000400000-0x000000000045C000-memory.dmp
    Filesize

    368KB

  • memory/4100-135-0x0000000000400000-0x000000000045C000-memory.dmp
    Filesize

    368KB

  • memory/4424-132-0x0000000000000000-mapping.dmp
  • memory/4424-137-0x0000000000400000-0x000000000045C000-memory.dmp
    Filesize

    368KB

  • memory/4424-136-0x00000000006B0000-0x00000000006B8000-memory.dmp
    Filesize

    32KB

  • memory/4424-138-0x0000000000400000-0x000000000045C000-memory.dmp
    Filesize

    368KB