Analysis
-
max time kernel
147s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
17-07-2022 01:02
Static task
static1
Behavioral task
behavioral1
Sample
530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe
Resource
win10v2004-20220414-en
General
-
Target
530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe
-
Size
84KB
-
MD5
8fd13283ab7be9feda213f1046c894a1
-
SHA1
cde8940b8592584606259377a416cba1fe14dbbe
-
SHA256
530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476
-
SHA512
8a0bcc97ee61dc737ca667848618203b95be9a2666980275948c813db365c1c379f50b95218b4175be835f256bc6b032eac4b06ca9ec235ddefe31ccb2af8c87
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\aadrive32.exe" 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe -
Executes dropped EXE 2 IoCs
Processes:
aadrive32.exeaadrive32.exepid process 900 aadrive32.exe 920 aadrive32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\aadrive32.exe" 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exeaadrive32.exedescription pid process target process PID 1812 set thread context of 868 1812 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe PID 900 set thread context of 920 900 aadrive32.exe aadrive32.exe -
Drops file in Windows directory 3 IoCs
Processes:
530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exeaadrive32.exedescription ioc process File opened for modification C:\Windows\aadrive32.exe 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe File created C:\Windows\%windir%\lfffile32.log aadrive32.exe File created C:\Windows\aadrive32.exe 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exepid process 868 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe 868 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exeaadrive32.exedescription pid process target process PID 1812 wrote to memory of 868 1812 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe PID 1812 wrote to memory of 868 1812 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe PID 1812 wrote to memory of 868 1812 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe PID 1812 wrote to memory of 868 1812 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe PID 1812 wrote to memory of 868 1812 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe PID 1812 wrote to memory of 868 1812 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe PID 1812 wrote to memory of 868 1812 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe PID 1812 wrote to memory of 868 1812 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe PID 868 wrote to memory of 900 868 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe aadrive32.exe PID 868 wrote to memory of 900 868 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe aadrive32.exe PID 868 wrote to memory of 900 868 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe aadrive32.exe PID 868 wrote to memory of 900 868 530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe aadrive32.exe PID 900 wrote to memory of 920 900 aadrive32.exe aadrive32.exe PID 900 wrote to memory of 920 900 aadrive32.exe aadrive32.exe PID 900 wrote to memory of 920 900 aadrive32.exe aadrive32.exe PID 900 wrote to memory of 920 900 aadrive32.exe aadrive32.exe PID 900 wrote to memory of 920 900 aadrive32.exe aadrive32.exe PID 900 wrote to memory of 920 900 aadrive32.exe aadrive32.exe PID 900 wrote to memory of 920 900 aadrive32.exe aadrive32.exe PID 900 wrote to memory of 920 900 aadrive32.exe aadrive32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe"C:\Users\Admin\AppData\Local\Temp\530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exeC:\Users\Admin\AppData\Local\Temp\530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476.exe2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\aadrive32.exe"C:\Windows\aadrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\aadrive32.exeC:\Windows\aadrive32.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD58fd13283ab7be9feda213f1046c894a1
SHA1cde8940b8592584606259377a416cba1fe14dbbe
SHA256530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476
SHA5128a0bcc97ee61dc737ca667848618203b95be9a2666980275948c813db365c1c379f50b95218b4175be835f256bc6b032eac4b06ca9ec235ddefe31ccb2af8c87
-
Filesize
84KB
MD58fd13283ab7be9feda213f1046c894a1
SHA1cde8940b8592584606259377a416cba1fe14dbbe
SHA256530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476
SHA5128a0bcc97ee61dc737ca667848618203b95be9a2666980275948c813db365c1c379f50b95218b4175be835f256bc6b032eac4b06ca9ec235ddefe31ccb2af8c87
-
Filesize
84KB
MD58fd13283ab7be9feda213f1046c894a1
SHA1cde8940b8592584606259377a416cba1fe14dbbe
SHA256530fac43f1252ed34b399fed1b2a74ceb92b66ad78e932bd9bad1337c412d476
SHA5128a0bcc97ee61dc737ca667848618203b95be9a2666980275948c813db365c1c379f50b95218b4175be835f256bc6b032eac4b06ca9ec235ddefe31ccb2af8c87