Analysis

  • max time kernel
    159s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2022 15:51

General

  • Target

    55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exe

  • Size

    584KB

  • MD5

    b8c211eaae34c112f19811f79ade1836

  • SHA1

    a21c6ad55fcff138f297f138012f64a16d7a3b9b

  • SHA256

    55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720

  • SHA512

    7deb70dbc24ee36962437c2267d5fd398766096f50bc4706f943213eb5e5fe470f86b5d3619fdf9bb809f0ce5a22e2a74c174f4726b2c46e4e47bcd7ebf68ba5

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exe
    "C:\Users\Admin\AppData\Local\Temp\55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exe"
    1⤵
    • Identifies Wine through registry keys
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:3764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3764-130-0x0000000000400000-0x00000000005C4000-memory.dmp

    Filesize

    1.8MB

  • memory/3764-131-0x0000000000400000-0x00000000005C4000-memory.dmp

    Filesize

    1.8MB

  • memory/3764-132-0x0000000000400000-0x00000000005C4000-memory.dmp

    Filesize

    1.8MB

  • memory/3764-133-0x0000000000400000-0x00000000005C4000-memory.dmp

    Filesize

    1.8MB