Analysis

  • max time kernel
    161s
  • max time network
    206s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 09:58

General

  • Target

    a87fb882e248d4091541cd355ed3227801d014d83051f610edf08ac0c7a964a1.exe

  • Size

    1.8MB

  • MD5

    d82cf866082b643af2e30bc6e2d2b5d5

  • SHA1

    e4a416739bbde89e3fe7d613e6d421c282f2a22d

  • SHA256

    a87fb882e248d4091541cd355ed3227801d014d83051f610edf08ac0c7a964a1

  • SHA512

    b71ff0d14b59877dca3bf45a164b7d93a23e48520e055a1f7b25a021a257871633a5ec99182f65425b47f78b1e4020bd4d031299e4586ea22ba07e0c83339de4

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

193.37.213.221:56300

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 2 IoCs
  • Blocks application from running via registry modification 13 IoCs

    Adds application to list of disallowed applications.

  • Executes dropped EXE 2 IoCs
  • Stops running service(s) 3 TTPs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies WinLogon 2 TTPs 6 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a87fb882e248d4091541cd355ed3227801d014d83051f610edf08ac0c7a964a1.exe
    "C:\Users\Admin\AppData\Local\Temp\a87fb882e248d4091541cd355ed3227801d014d83051f610edf08ac0c7a964a1.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • UAC bypass
    • Blocks application from running via registry modification
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Modifies WinLogon
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1276
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c sc delete swprv
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1432
      • C:\Windows\SysWOW64\sc.exe
        sc delete swprv
        3⤵
        • Launches sc.exe
        PID:1264
    • C:\ProgramData\RealtekHD\taskhostw.exe
      C:\ProgramData\RealtekHD\taskhostw.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1220
    • C:\ProgramData\install\taskhosta.exe
      C:\ProgramData\install\taskhosta.exe
      2⤵
      • Executes dropped EXE
      PID:1792

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Winlogon Helper DLL

1
T1004

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

6
T1112

Disabling Security Tools

2
T1089

Hidden Files and Directories

1
T1158

Bypass User Account Control

1
T1088

Impair Defenses

1
T1562

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Impact

Service Stop

1
T1489

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\RealtekHD\taskhostw.exe
    Filesize

    1.2MB

    MD5

    53a211535faf989e07053afc4e75a183

    SHA1

    5ed055e3bc6beab301bdb9bd04c2841748d8e9a6

    SHA256

    64b1bc9934bad64d4dfe1e2ed75d937ba78d3013eee2ccce36de0107557e3b12

    SHA512

    d54333ed55e883505193fd52510bded3df814a5fe081e698345ae1e619dd7ca0e04119c802fb8cf24f6bdca3fb0af34b5dd6575b80f6e3205af25f80597e4c9c

  • C:\ProgramData\RealtekHD\taskhostw.exe
    Filesize

    1.2MB

    MD5

    53a211535faf989e07053afc4e75a183

    SHA1

    5ed055e3bc6beab301bdb9bd04c2841748d8e9a6

    SHA256

    64b1bc9934bad64d4dfe1e2ed75d937ba78d3013eee2ccce36de0107557e3b12

    SHA512

    d54333ed55e883505193fd52510bded3df814a5fe081e698345ae1e619dd7ca0e04119c802fb8cf24f6bdca3fb0af34b5dd6575b80f6e3205af25f80597e4c9c

  • C:\ProgramData\install\taskhosta.exe
    Filesize

    72KB

    MD5

    ffe5e3d390984a86544d9256d01c0803

    SHA1

    40e5818c220442bea1ee5d605fb2e95b3cabfa63

    SHA256

    0e8fea7af1cb4db192979a676cf5787563e22d429257486c9b9e0d8caad3aed3

    SHA512

    dc1b7afbd3dbc93812c03ac1b33953e114dd529da97e7d5745ed869146652aee756fd45197895490ccdb5cc52d6a0c1f2d1422a918abeee0924200a6e737692b

  • \ProgramData\RealtekHD\taskhostw.exe
    Filesize

    1.2MB

    MD5

    53a211535faf989e07053afc4e75a183

    SHA1

    5ed055e3bc6beab301bdb9bd04c2841748d8e9a6

    SHA256

    64b1bc9934bad64d4dfe1e2ed75d937ba78d3013eee2ccce36de0107557e3b12

    SHA512

    d54333ed55e883505193fd52510bded3df814a5fe081e698345ae1e619dd7ca0e04119c802fb8cf24f6bdca3fb0af34b5dd6575b80f6e3205af25f80597e4c9c

  • \ProgramData\install\taskhosta.exe
    Filesize

    72KB

    MD5

    ffe5e3d390984a86544d9256d01c0803

    SHA1

    40e5818c220442bea1ee5d605fb2e95b3cabfa63

    SHA256

    0e8fea7af1cb4db192979a676cf5787563e22d429257486c9b9e0d8caad3aed3

    SHA512

    dc1b7afbd3dbc93812c03ac1b33953e114dd529da97e7d5745ed869146652aee756fd45197895490ccdb5cc52d6a0c1f2d1422a918abeee0924200a6e737692b

  • \ProgramData\install\taskhosta.exe
    Filesize

    72KB

    MD5

    ffe5e3d390984a86544d9256d01c0803

    SHA1

    40e5818c220442bea1ee5d605fb2e95b3cabfa63

    SHA256

    0e8fea7af1cb4db192979a676cf5787563e22d429257486c9b9e0d8caad3aed3

    SHA512

    dc1b7afbd3dbc93812c03ac1b33953e114dd529da97e7d5745ed869146652aee756fd45197895490ccdb5cc52d6a0c1f2d1422a918abeee0924200a6e737692b

  • memory/1220-58-0x0000000000000000-mapping.dmp
  • memory/1264-56-0x0000000000000000-mapping.dmp
  • memory/1276-54-0x0000000075A61000-0x0000000075A63000-memory.dmp
    Filesize

    8KB

  • memory/1432-55-0x0000000000000000-mapping.dmp
  • memory/1792-64-0x0000000000000000-mapping.dmp