Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 00:58
Static task
static1
Behavioral task
behavioral1
Sample
2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe
Resource
win10v2004-20220812-en
General
-
Target
2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe
-
Size
260KB
-
MD5
8301de0df88ac7095d48d1cca98252b1
-
SHA1
5641827c0c9d0e80179a832a6613f07a5c30fb0e
-
SHA256
2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9
-
SHA512
9f5e96ec405472632a469ca2324ab35e7d366d1f14d654a818799091ebf8ce7cce17cbd7347c3cabfd4132e5b02d1c917d7d0ee1ab63bf087ec5288dccea924a
-
SSDEEP
3072:D3sUtq7WH2ZRTUKGkpRu2yW0pXUAICQKBorhlAF4EojNbD2sFDAmeB3mIH3J:D3sUESHsRQKfwtTRqh3ZSmeB3xHZ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
wmpdt86.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List wmpdt86.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmpdt86.exe = "C:\\Windows\\SysWOW64\\wmpdt86.exe:*:Enabled:Windows Data Recovery" wmpdt86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List wmpdt86.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmpdt86.exe = "C:\\Windows\\SysWOW64\\wmpdt86.exe:*:Enabled:Windows Data Recovery" wmpdt86.exe -
Executes dropped EXE 2 IoCs
Processes:
wmpdt86.exewmpdt86.exepid process 1820 wmpdt86.exe 2032 wmpdt86.exe -
Processes:
resource yara_rule behavioral1/memory/1428-56-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1428-58-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1428-59-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1428-61-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1428-65-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1428-66-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1428-67-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1428-68-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1428-83-0x0000000002DB0000-0x0000000002E07000-memory.dmp upx behavioral1/memory/2032-85-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/1428-88-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2032-89-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2032-90-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/2032-91-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
wmpdt86.exepid process 2032 wmpdt86.exe -
Loads dropped DLL 1 IoCs
Processes:
2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exepid process 1428 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wmpdt86.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run wmpdt86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Data Recovery = "C:\\Windows\\SysWOW64\\wmpdt86.exe" wmpdt86.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exewmpdt86.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdt86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpdt86.exe -
Drops file in System32 directory 5 IoCs
Processes:
2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exewmpdt86.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe File opened for modification C:\Windows\SysWOW64\wmpdt86.exe 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe File created C:\Windows\SysWOW64\wmpdt86.exe 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe File opened for modification C:\Windows\SysWOW64\ wmpdt86.exe File opened for modification C:\Windows\SysWOW64\wmpdt86.exe wmpdt86.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exewmpdt86.exedescription pid process target process PID 1044 set thread context of 1428 1044 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe PID 1820 set thread context of 2032 1820 wmpdt86.exe wmpdt86.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exewmpdt86.exepid process 1428 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe 1428 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe 2032 wmpdt86.exe 2032 wmpdt86.exe 2032 wmpdt86.exe 2032 wmpdt86.exe 2032 wmpdt86.exe 2032 wmpdt86.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exewmpdt86.exewmpdt86.exedescription pid process target process PID 1044 wrote to memory of 1428 1044 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe PID 1044 wrote to memory of 1428 1044 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe PID 1044 wrote to memory of 1428 1044 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe PID 1044 wrote to memory of 1428 1044 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe PID 1044 wrote to memory of 1428 1044 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe PID 1044 wrote to memory of 1428 1044 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe PID 1044 wrote to memory of 1428 1044 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe PID 1044 wrote to memory of 1428 1044 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe PID 1428 wrote to memory of 1820 1428 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe wmpdt86.exe PID 1428 wrote to memory of 1820 1428 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe wmpdt86.exe PID 1428 wrote to memory of 1820 1428 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe wmpdt86.exe PID 1428 wrote to memory of 1820 1428 2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe wmpdt86.exe PID 1820 wrote to memory of 2032 1820 wmpdt86.exe wmpdt86.exe PID 1820 wrote to memory of 2032 1820 wmpdt86.exe wmpdt86.exe PID 1820 wrote to memory of 2032 1820 wmpdt86.exe wmpdt86.exe PID 1820 wrote to memory of 2032 1820 wmpdt86.exe wmpdt86.exe PID 1820 wrote to memory of 2032 1820 wmpdt86.exe wmpdt86.exe PID 1820 wrote to memory of 2032 1820 wmpdt86.exe wmpdt86.exe PID 1820 wrote to memory of 2032 1820 wmpdt86.exe wmpdt86.exe PID 1820 wrote to memory of 2032 1820 wmpdt86.exe wmpdt86.exe PID 2032 wrote to memory of 1268 2032 wmpdt86.exe Explorer.EXE PID 2032 wrote to memory of 1268 2032 wmpdt86.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe"C:\Users\Admin\AppData\Local\Temp\2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe"C:\Users\Admin\AppData\Local\Temp\2d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9.exe"3⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\wmpdt86.exe"C:\Windows\SysWOW64\wmpdt86.exe" C:\Users\Admin\AppData\Local\Temp\2D123A~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\wmpdt86.exe"C:\Windows\SysWOW64\wmpdt86.exe" C:\Users\Admin\AppData\Local\Temp\2D123A~1.EXE5⤵
- Modifies firewall policy service
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD58301de0df88ac7095d48d1cca98252b1
SHA15641827c0c9d0e80179a832a6613f07a5c30fb0e
SHA2562d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9
SHA5129f5e96ec405472632a469ca2324ab35e7d366d1f14d654a818799091ebf8ce7cce17cbd7347c3cabfd4132e5b02d1c917d7d0ee1ab63bf087ec5288dccea924a
-
Filesize
260KB
MD58301de0df88ac7095d48d1cca98252b1
SHA15641827c0c9d0e80179a832a6613f07a5c30fb0e
SHA2562d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9
SHA5129f5e96ec405472632a469ca2324ab35e7d366d1f14d654a818799091ebf8ce7cce17cbd7347c3cabfd4132e5b02d1c917d7d0ee1ab63bf087ec5288dccea924a
-
Filesize
260KB
MD58301de0df88ac7095d48d1cca98252b1
SHA15641827c0c9d0e80179a832a6613f07a5c30fb0e
SHA2562d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9
SHA5129f5e96ec405472632a469ca2324ab35e7d366d1f14d654a818799091ebf8ce7cce17cbd7347c3cabfd4132e5b02d1c917d7d0ee1ab63bf087ec5288dccea924a
-
Filesize
260KB
MD58301de0df88ac7095d48d1cca98252b1
SHA15641827c0c9d0e80179a832a6613f07a5c30fb0e
SHA2562d123a8f5c12b1c2d2867144eaa3f7fffec566236017253bc0de76fa0defb6b9
SHA5129f5e96ec405472632a469ca2324ab35e7d366d1f14d654a818799091ebf8ce7cce17cbd7347c3cabfd4132e5b02d1c917d7d0ee1ab63bf087ec5288dccea924a