Analysis
-
max time kernel
144s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 02:58
Static task
static1
Behavioral task
behavioral1
Sample
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe
Resource
win10v2004-20220812-en
General
-
Target
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe
-
Size
224KB
-
MD5
dee61e699e48a2b182d58627dc8098ca
-
SHA1
021e253fccf06320a951dc0844509f50bd286b47
-
SHA256
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
-
SHA512
add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
SSDEEP
3072:WkMlKuJpIOlgpX2tt1a6REPK2TxbFl3JD+VcNezhUs0bRLNmt1:X+9rkpXSkomZT1Pbezx0FLNk
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 3 IoCs
Processes:
taskmn32.exetaskmn32.exetaskmn32.exepid process 524 taskmn32.exe 1532 taskmn32.exe 280 taskmn32.exe -
Processes:
resource yara_rule behavioral1/memory/948-56-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/948-58-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/948-59-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/948-64-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/948-65-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/948-66-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/948-71-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1532-86-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1532-87-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1532-88-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1532-94-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
taskmn32.exepid process 1532 taskmn32.exe -
Loads dropped DLL 6 IoCs
Processes:
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exetaskmn32.exetaskmn32.exepid process 948 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 948 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 524 taskmn32.exe 524 taskmn32.exe 1532 taskmn32.exe 1532 taskmn32.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exetaskmn32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum taskmn32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 taskmn32.exe -
Drops file in System32 directory 6 IoCs
Processes:
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exetaskmn32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\taskmn32.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe File created C:\Windows\SysWOW64\taskmn32.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe File opened for modification C:\Windows\SysWOW64\ taskmn32.exe File opened for modification C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File created C:\Windows\SysWOW64\taskmn32.exe taskmn32.exe File opened for modification C:\Windows\SysWOW64\ 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exetaskmn32.exedescription pid process target process PID 2028 set thread context of 948 2028 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe PID 524 set thread context of 1532 524 taskmn32.exe taskmn32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exetaskmn32.exepid process 948 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 948 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 1532 taskmn32.exe 1532 taskmn32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exetaskmn32.exetaskmn32.exedescription pid process target process PID 2028 wrote to memory of 948 2028 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe PID 2028 wrote to memory of 948 2028 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe PID 2028 wrote to memory of 948 2028 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe PID 2028 wrote to memory of 948 2028 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe PID 2028 wrote to memory of 948 2028 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe PID 2028 wrote to memory of 948 2028 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe PID 2028 wrote to memory of 948 2028 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe PID 948 wrote to memory of 524 948 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe taskmn32.exe PID 948 wrote to memory of 524 948 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe taskmn32.exe PID 948 wrote to memory of 524 948 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe taskmn32.exe PID 948 wrote to memory of 524 948 12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe taskmn32.exe PID 524 wrote to memory of 1532 524 taskmn32.exe taskmn32.exe PID 524 wrote to memory of 1532 524 taskmn32.exe taskmn32.exe PID 524 wrote to memory of 1532 524 taskmn32.exe taskmn32.exe PID 524 wrote to memory of 1532 524 taskmn32.exe taskmn32.exe PID 524 wrote to memory of 1532 524 taskmn32.exe taskmn32.exe PID 524 wrote to memory of 1532 524 taskmn32.exe taskmn32.exe PID 524 wrote to memory of 1532 524 taskmn32.exe taskmn32.exe PID 1532 wrote to memory of 280 1532 taskmn32.exe taskmn32.exe PID 1532 wrote to memory of 280 1532 taskmn32.exe taskmn32.exe PID 1532 wrote to memory of 280 1532 taskmn32.exe taskmn32.exe PID 1532 wrote to memory of 280 1532 taskmn32.exe taskmn32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe"C:\Users\Admin\AppData\Local\Temp\12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe"C:\Users\Admin\AppData\Local\Temp\12c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Users\Admin\AppData\Local\Temp\12C755~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Users\Admin\AppData\Local\Temp\12C755~1.EXE4⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\taskmn32.exe"C:\Windows\system32\taskmn32.exe" C:\Windows\SysWOW64\taskmn32.exe5⤵
- Executes dropped EXE
PID:280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc
-
Filesize
224KB
MD5dee61e699e48a2b182d58627dc8098ca
SHA1021e253fccf06320a951dc0844509f50bd286b47
SHA25612c7556f2716936e43a42bf712b728287e8f6b36d768bc342b01bf90d540fc6d
SHA512add37bd956ed096a4bf888e4b3d3eba956c42b4edb67fa76539e625a2ec172e90c11f00b4b77936046e1b894b24f8cf8c4a3bfc4091fcd676d39525ed10803cc