Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-07-2022 20:19
Static task
static1
Behavioral task
behavioral1
Sample
4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe
Resource
win10v2004-20220414-en
General
-
Target
4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe
-
Size
516KB
-
MD5
0d468d8b2a1f7f599575a60378554192
-
SHA1
2b3b2c9faf513e262ad623bd3c21ee4cc1a4ad2d
-
SHA256
4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22
-
SHA512
b009e1ff811fa525591ea9259b4c0d7b5e10c914dc8f8be7f0d6843c1beadf79305a96f60ad752922af95d25ef90adfa7c7485d9467130b44920faba9d11b747
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 5 IoCs
Processes:
AUE66.exemsn.exemsn.execsrss.execsrss.exepid process 4940 AUE66.exe 5076 msn.exe 1688 msn.exe 2204 csrss.exe 320 csrss.exe -
Processes:
resource yara_rule behavioral2/memory/2348-138-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral2/memory/2348-140-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral2/memory/2348-141-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral2/memory/2348-144-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral2/memory/2348-154-0x0000000000400000-0x0000000000482000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
AUE66.exe4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation AUE66.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msn.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ msn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Remote Registry Service = "csrss.exe" msn.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\F26D\msn.exe autoit_exe C:\Users\Admin\F26D\msn.exe autoit_exe C:\Users\Admin\F26D\msn.exe autoit_exe C:\Windows\csrss.exe autoit_exe C:\Windows\csrss.exe autoit_exe C:\Windows\csrss.exe autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exemsn.execsrss.exedescription pid process target process PID 4572 set thread context of 2348 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe PID 4572 set thread context of 3120 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe PID 5076 set thread context of 1688 5076 msn.exe msn.exe PID 2204 set thread context of 320 2204 csrss.exe csrss.exe -
Drops file in Windows directory 2 IoCs
Processes:
msn.exedescription ioc process File opened for modification C:\Windows\csrss.exe msn.exe File created C:\Windows\csrss.exe msn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
msn.execsrss.exepid process 5076 msn.exe 5076 msn.exe 2204 csrss.exe 2204 csrss.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exepid process 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 2348 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exeAUE66.exemsn.exemsn.execsrss.exedescription pid process target process PID 4572 wrote to memory of 2348 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe PID 4572 wrote to memory of 2348 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe PID 4572 wrote to memory of 2348 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe PID 4572 wrote to memory of 2348 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe PID 4572 wrote to memory of 2348 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe PID 4572 wrote to memory of 2348 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe PID 4572 wrote to memory of 2348 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe PID 4572 wrote to memory of 2348 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe PID 4572 wrote to memory of 3120 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe PID 4572 wrote to memory of 3120 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe PID 4572 wrote to memory of 3120 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe PID 4572 wrote to memory of 3120 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe PID 4572 wrote to memory of 3120 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe PID 4572 wrote to memory of 3120 4572 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe PID 2348 wrote to memory of 4940 2348 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe AUE66.exe PID 2348 wrote to memory of 4940 2348 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe AUE66.exe PID 2348 wrote to memory of 4940 2348 4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe AUE66.exe PID 4940 wrote to memory of 5076 4940 AUE66.exe msn.exe PID 4940 wrote to memory of 5076 4940 AUE66.exe msn.exe PID 4940 wrote to memory of 5076 4940 AUE66.exe msn.exe PID 5076 wrote to memory of 1688 5076 msn.exe msn.exe PID 5076 wrote to memory of 1688 5076 msn.exe msn.exe PID 5076 wrote to memory of 1688 5076 msn.exe msn.exe PID 5076 wrote to memory of 1688 5076 msn.exe msn.exe PID 5076 wrote to memory of 1688 5076 msn.exe msn.exe PID 5076 wrote to memory of 1688 5076 msn.exe msn.exe PID 5076 wrote to memory of 1688 5076 msn.exe msn.exe PID 5076 wrote to memory of 1688 5076 msn.exe msn.exe PID 5076 wrote to memory of 1688 5076 msn.exe msn.exe PID 1688 wrote to memory of 2204 1688 msn.exe csrss.exe PID 1688 wrote to memory of 2204 1688 msn.exe csrss.exe PID 1688 wrote to memory of 2204 1688 msn.exe csrss.exe PID 2204 wrote to memory of 320 2204 csrss.exe csrss.exe PID 2204 wrote to memory of 320 2204 csrss.exe csrss.exe PID 2204 wrote to memory of 320 2204 csrss.exe csrss.exe PID 2204 wrote to memory of 320 2204 csrss.exe csrss.exe PID 2204 wrote to memory of 320 2204 csrss.exe csrss.exe PID 2204 wrote to memory of 320 2204 csrss.exe csrss.exe PID 2204 wrote to memory of 320 2204 csrss.exe csrss.exe PID 2204 wrote to memory of 320 2204 csrss.exe csrss.exe PID 2204 wrote to memory of 320 2204 csrss.exe csrss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe"C:\Users\Admin\AppData\Local\Temp\4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe"C:\Users\Admin\AppData\Local\Temp\4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AUE66.exe"C:\Users\Admin\AppData\Local\Temp\AUE66.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\F26D\msn.exe"C:\Users\Admin\F26D\msn.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\F26D\msn.exe"C:\Users\Admin\F26D\msn.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\csrss.exe"C:\Windows\csrss.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\csrss.exe"C:\Windows\csrss.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe"C:\Users\Admin\AppData\Local\Temp\4048086659a25f46c3bbe14643948d28ba004a68407476c5e8b95dfeca458b22.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\AUE66.exeFilesize
483KB
MD5846e69454ddca6f801239f0ff1e120be
SHA1ff39cb2768bbf26e649892c01e470436f89f5599
SHA256c6522bffd4b703164fed1600e3ecf2ef16d4b1b8b2493dcc8a1fca7ed3bfa65a
SHA512b84870dca624e163417544e766165a5c2683faef5e78f36f68a5b5e84171d472ee0da5097728787ee3f2cc567101ce5e9f9c69f8f0788af60c7d5ad9da67fd22
-
C:\Users\Admin\AppData\Local\Temp\AUE66.exeFilesize
483KB
MD5846e69454ddca6f801239f0ff1e120be
SHA1ff39cb2768bbf26e649892c01e470436f89f5599
SHA256c6522bffd4b703164fed1600e3ecf2ef16d4b1b8b2493dcc8a1fca7ed3bfa65a
SHA512b84870dca624e163417544e766165a5c2683faef5e78f36f68a5b5e84171d472ee0da5097728787ee3f2cc567101ce5e9f9c69f8f0788af60c7d5ad9da67fd22
-
C:\Users\Admin\F26D\msn.exeFilesize
728KB
MD51838249f6e218963310b439c330e968f
SHA1ede425b7e5bf6e48aad44911fc019d96860030b7
SHA256e58756634c366fb6c92562750eab8f48f0044b8204e753dfee62b9c1c9c2b109
SHA512f1226a8c44d788c3c1c7ff2a925f20bee61db43f193bcf862d503ab7f683869a0d64d7b4ecd017876e7ea494caa9a94a55b4e2155c116a3d53a5e5f2b93d0659
-
C:\Users\Admin\F26D\msn.exeFilesize
728KB
MD51838249f6e218963310b439c330e968f
SHA1ede425b7e5bf6e48aad44911fc019d96860030b7
SHA256e58756634c366fb6c92562750eab8f48f0044b8204e753dfee62b9c1c9c2b109
SHA512f1226a8c44d788c3c1c7ff2a925f20bee61db43f193bcf862d503ab7f683869a0d64d7b4ecd017876e7ea494caa9a94a55b4e2155c116a3d53a5e5f2b93d0659
-
C:\Users\Admin\F26D\msn.exeFilesize
728KB
MD51838249f6e218963310b439c330e968f
SHA1ede425b7e5bf6e48aad44911fc019d96860030b7
SHA256e58756634c366fb6c92562750eab8f48f0044b8204e753dfee62b9c1c9c2b109
SHA512f1226a8c44d788c3c1c7ff2a925f20bee61db43f193bcf862d503ab7f683869a0d64d7b4ecd017876e7ea494caa9a94a55b4e2155c116a3d53a5e5f2b93d0659
-
C:\Windows\csrss.exeFilesize
728KB
MD51838249f6e218963310b439c330e968f
SHA1ede425b7e5bf6e48aad44911fc019d96860030b7
SHA256e58756634c366fb6c92562750eab8f48f0044b8204e753dfee62b9c1c9c2b109
SHA512f1226a8c44d788c3c1c7ff2a925f20bee61db43f193bcf862d503ab7f683869a0d64d7b4ecd017876e7ea494caa9a94a55b4e2155c116a3d53a5e5f2b93d0659
-
C:\Windows\csrss.exeFilesize
728KB
MD51838249f6e218963310b439c330e968f
SHA1ede425b7e5bf6e48aad44911fc019d96860030b7
SHA256e58756634c366fb6c92562750eab8f48f0044b8204e753dfee62b9c1c9c2b109
SHA512f1226a8c44d788c3c1c7ff2a925f20bee61db43f193bcf862d503ab7f683869a0d64d7b4ecd017876e7ea494caa9a94a55b4e2155c116a3d53a5e5f2b93d0659
-
C:\Windows\csrss.exeFilesize
728KB
MD51838249f6e218963310b439c330e968f
SHA1ede425b7e5bf6e48aad44911fc019d96860030b7
SHA256e58756634c366fb6c92562750eab8f48f0044b8204e753dfee62b9c1c9c2b109
SHA512f1226a8c44d788c3c1c7ff2a925f20bee61db43f193bcf862d503ab7f683869a0d64d7b4ecd017876e7ea494caa9a94a55b4e2155c116a3d53a5e5f2b93d0659
-
memory/320-171-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/320-166-0x0000000000000000-mapping.dmp
-
memory/1688-165-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/1688-161-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/1688-159-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/1688-156-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/1688-155-0x0000000000000000-mapping.dmp
-
memory/2204-162-0x0000000000000000-mapping.dmp
-
memory/2348-137-0x0000000000000000-mapping.dmp
-
memory/2348-141-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2348-154-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2348-144-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2348-140-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/2348-138-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/3120-145-0x0000000000000000-mapping.dmp
-
memory/3120-146-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/4572-147-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/4572-132-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/4572-135-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/4572-134-0x0000000000650000-0x0000000000652000-memory.dmpFilesize
8KB
-
memory/4572-136-0x0000000000671000-0x0000000000673000-memory.dmpFilesize
8KB
-
memory/4940-148-0x0000000000000000-mapping.dmp
-
memory/5076-151-0x0000000000000000-mapping.dmp