Analysis
-
max time kernel
89s -
max time network
99s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 06:03
Static task
static1
Behavioral task
behavioral1
Sample
702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe
Resource
win10v2004-20220901-en
General
-
Target
702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe
-
Size
180KB
-
MD5
d6abdf9845d5948f814b72d5397446d5
-
SHA1
9880a216e2a36c7ada39ea1b580a5661aa2ac14a
-
SHA256
702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce
-
SHA512
783c477442e3d7869f6252bb0201bdc54c72ea8deb28e169f20e05aa20c8306118dd697d7737c8aaa5e32abd9ccfc2311c7f49e64011b507881231c2ff3b2f51
-
SSDEEP
3072:iO0j0EfPM5qpeCVV34Ay4rlLSJ1MVoCMnxZUfUKIAtC4HS13BJQWwsS+ArxoKTIH:n0j0EfP+qgSV3ty5JGMxmfUK5gOWwsSk
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
wmpkn32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmpkn32.exe = "C:\\Windows\\SysWOW64\\wmpkn32.exe:*:Enabled:Windows Media Services" wmpkn32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List wmpkn32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmpkn32.exe = "C:\\Windows\\SysWOW64\\wmpkn32.exe:*:Enabled:Windows Media Services" wmpkn32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List wmpkn32.exe -
Executes dropped EXE 2 IoCs
Processes:
wmpkn32.exewmpkn32.exepid process 1204 wmpkn32.exe 2020 wmpkn32.exe -
Processes:
resource yara_rule behavioral1/memory/908-58-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/908-57-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/908-55-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/908-62-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/908-63-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/908-64-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/908-65-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/908-82-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2020-83-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2020-84-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
wmpkn32.exepid process 2020 wmpkn32.exe -
Loads dropped DLL 2 IoCs
Processes:
702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exepid process 908 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe 908 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wmpkn32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run wmpkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Media Services = "C:\\Windows\\SysWOW64\\wmpkn32.exe" wmpkn32.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
wmpkn32.exe702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpkn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkn32.exe -
Drops file in System32 directory 4 IoCs
Processes:
702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exewmpkn32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe File opened for modification C:\Windows\SysWOW64\wmpkn32.exe 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe File created C:\Windows\SysWOW64\wmpkn32.exe 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe File opened for modification C:\Windows\SysWOW64\ wmpkn32.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exewmpkn32.exedescription pid process target process PID 868 set thread context of 908 868 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe PID 1204 set thread context of 2020 1204 wmpkn32.exe wmpkn32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exewmpkn32.exepid process 908 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe 908 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe 2020 wmpkn32.exe 2020 wmpkn32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exewmpkn32.exewmpkn32.exedescription pid process target process PID 868 wrote to memory of 908 868 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe PID 868 wrote to memory of 908 868 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe PID 868 wrote to memory of 908 868 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe PID 868 wrote to memory of 908 868 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe PID 868 wrote to memory of 908 868 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe PID 868 wrote to memory of 908 868 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe PID 868 wrote to memory of 908 868 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe PID 908 wrote to memory of 1204 908 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe wmpkn32.exe PID 908 wrote to memory of 1204 908 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe wmpkn32.exe PID 908 wrote to memory of 1204 908 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe wmpkn32.exe PID 908 wrote to memory of 1204 908 702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe wmpkn32.exe PID 1204 wrote to memory of 2020 1204 wmpkn32.exe wmpkn32.exe PID 1204 wrote to memory of 2020 1204 wmpkn32.exe wmpkn32.exe PID 1204 wrote to memory of 2020 1204 wmpkn32.exe wmpkn32.exe PID 1204 wrote to memory of 2020 1204 wmpkn32.exe wmpkn32.exe PID 1204 wrote to memory of 2020 1204 wmpkn32.exe wmpkn32.exe PID 1204 wrote to memory of 2020 1204 wmpkn32.exe wmpkn32.exe PID 1204 wrote to memory of 2020 1204 wmpkn32.exe wmpkn32.exe PID 2020 wrote to memory of 1300 2020 wmpkn32.exe Explorer.EXE PID 2020 wrote to memory of 1300 2020 wmpkn32.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe"C:\Users\Admin\AppData\Local\Temp\702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe"C:\Users\Admin\AppData\Local\Temp\702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce.exe"3⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\wmpkn32.exe"C:\Windows\SysWOW64\wmpkn32.exe" C:\Users\Admin\AppData\Local\Temp\702639~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\wmpkn32.exe"C:\Windows\SysWOW64\wmpkn32.exe" C:\Users\Admin\AppData\Local\Temp\702639~1.EXE5⤵
- Modifies firewall policy service
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5d6abdf9845d5948f814b72d5397446d5
SHA19880a216e2a36c7ada39ea1b580a5661aa2ac14a
SHA256702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce
SHA512783c477442e3d7869f6252bb0201bdc54c72ea8deb28e169f20e05aa20c8306118dd697d7737c8aaa5e32abd9ccfc2311c7f49e64011b507881231c2ff3b2f51
-
Filesize
180KB
MD5d6abdf9845d5948f814b72d5397446d5
SHA19880a216e2a36c7ada39ea1b580a5661aa2ac14a
SHA256702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce
SHA512783c477442e3d7869f6252bb0201bdc54c72ea8deb28e169f20e05aa20c8306118dd697d7737c8aaa5e32abd9ccfc2311c7f49e64011b507881231c2ff3b2f51
-
Filesize
180KB
MD5d6abdf9845d5948f814b72d5397446d5
SHA19880a216e2a36c7ada39ea1b580a5661aa2ac14a
SHA256702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce
SHA512783c477442e3d7869f6252bb0201bdc54c72ea8deb28e169f20e05aa20c8306118dd697d7737c8aaa5e32abd9ccfc2311c7f49e64011b507881231c2ff3b2f51
-
Filesize
180KB
MD5d6abdf9845d5948f814b72d5397446d5
SHA19880a216e2a36c7ada39ea1b580a5661aa2ac14a
SHA256702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce
SHA512783c477442e3d7869f6252bb0201bdc54c72ea8deb28e169f20e05aa20c8306118dd697d7737c8aaa5e32abd9ccfc2311c7f49e64011b507881231c2ff3b2f51
-
Filesize
180KB
MD5d6abdf9845d5948f814b72d5397446d5
SHA19880a216e2a36c7ada39ea1b580a5661aa2ac14a
SHA256702639c970cd22d7251b63cef004509c9fba742419c9ff8f818b5d47ded8f9ce
SHA512783c477442e3d7869f6252bb0201bdc54c72ea8deb28e169f20e05aa20c8306118dd697d7737c8aaa5e32abd9ccfc2311c7f49e64011b507881231c2ff3b2f51