Analysis
-
max time kernel
159s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 15:51
Static task
static1
Behavioral task
behavioral1
Sample
55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exe
Resource
win10v2004-20220721-en
General
-
Target
55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exe
-
Size
584KB
-
MD5
b8c211eaae34c112f19811f79ade1836
-
SHA1
a21c6ad55fcff138f297f138012f64a16d7a3b9b
-
SHA256
55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720
-
SHA512
7deb70dbc24ee36962437c2267d5fd398766096f50bc4706f943213eb5e5fe470f86b5d3619fdf9bb809f0ce5a22e2a74c174f4726b2c46e4e47bcd7ebf68ba5
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Wine 55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exe -
Drops file in System32 directory 2 IoCs
Processes:
55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exedescription ioc process File created C:\Windows\SysWOW64\wbem\wmiclisv.exe 55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exe File opened for modification C:\Windows\SysWOW64\wbem\wmiclisv.exe 55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exepid process 3764 55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exepid process 3764 55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exe 3764 55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exe"C:\Users\Admin\AppData\Local\Temp\55809216ef03ad73962edfaf2433574341c7d46830c22810066a47b3295fa720.exe"1⤵
- Identifies Wine through registry keys
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3764