Analysis
-
max time kernel
25s -
max time network
28s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
18-09-2022 16:27
Static task
static1
Behavioral task
behavioral1
Sample
college.exe
Resource
win10-20220812-en
General
-
Target
college.exe
-
Size
472KB
-
MD5
c69f94a227bcd9c6aad0fb47a70206be
-
SHA1
45c381723f533255e1fe202a8164f27560bb512a
-
SHA256
565d5e1f67309d3864cb01a29a3b043485f05e55858a04cfcef9a1d35988f797
-
SHA512
3cae1dd987f28a716472b424f8e3f3b7061386fd5ecc30f3e6c8e5ad5cf80b3ce234272a821bfbe657c8384378605aef0697f85187e6733189d81751965ce7c3
-
SSDEEP
6144:y61E/QSnxoEMTlXEulocICldtWkbnVMALgQuDLZ8HB:y6ErxJMTtEul8Cldt3bVMtQELZ8HB
Malware Config
Extracted
metasploit
windows/reverse_tcp
45.79.121.251:1234
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 1 IoCs
Processes:
hacker.exepid process 4140 hacker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
college.exedescription pid process target process PID 2068 wrote to memory of 4140 2068 college.exe hacker.exe PID 2068 wrote to memory of 4140 2068 college.exe hacker.exe PID 2068 wrote to memory of 4140 2068 college.exe hacker.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD59ac0e035454a71e188d83ad4ba2db9e2
SHA13e07611cfe5dc0ac3b57641eba2db27a20c960e3
SHA256c35d530cbc034f9a6760fc8c172c76fdaf468b87a7d7c956fbc19687523f7ac3
SHA512ffd650e05475ab3d3da485c90baa72889a432128f5152416da6b632ab69eb65308ee4702b3b2156651f23b77259ae99c677ed909c5c56dfc178251e31c1071c1
-
Filesize
72KB
MD59ac0e035454a71e188d83ad4ba2db9e2
SHA13e07611cfe5dc0ac3b57641eba2db27a20c960e3
SHA256c35d530cbc034f9a6760fc8c172c76fdaf468b87a7d7c956fbc19687523f7ac3
SHA512ffd650e05475ab3d3da485c90baa72889a432128f5152416da6b632ab69eb65308ee4702b3b2156651f23b77259ae99c677ed909c5c56dfc178251e31c1071c1