Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 06:36
Static task
static1
Behavioral task
behavioral1
Sample
32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe
Resource
win10v2004-20220901-en
General
-
Target
32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe
-
Size
212KB
-
MD5
742909bc1d90ffce920ac50049133cfd
-
SHA1
1204c2640631f3997d935c706420059f246304f9
-
SHA256
32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29
-
SHA512
4557aca727a54fc33a04066ee828123c39740bc3498764c40f0405193461a8ea2ce76b693ce33e8f8569121c154d297c9aee1f6822647dd023aa0cc81eea9e37
-
SSDEEP
3072:4OqElnKetCj6omkCgXeXxhUlYyEjyM1BgMHm0bQUSFBbc1z+N6fHKM5nmv:FlnD1oWgqxhx3ngMbxSE1zawmv
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 2 TTPs 8 IoCs
Processes:
igfxdh86.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications igfxdh86.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxdh86.exe = "C:\\Windows\\SysWOW64\\igfxdh86.exe:*:Enabled:Intel Device Host" igfxdh86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List igfxdh86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile igfxdh86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications igfxdh86.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxdh86.exe = "C:\\Windows\\SysWOW64\\igfxdh86.exe:*:Enabled:Intel Device Host" igfxdh86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List igfxdh86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile igfxdh86.exe -
Executes dropped EXE 2 IoCs
Processes:
igfxdh86.exeigfxdh86.exepid process 1816 igfxdh86.exe 1792 igfxdh86.exe -
Processes:
resource yara_rule behavioral2/memory/1704-134-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1704-137-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1704-138-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/1704-139-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1704-140-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/1792-152-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1792-153-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
igfxdh86.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run igfxdh86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Intel Device Host = "C:\\Windows\\SysWOW64\\igfxdh86.exe" igfxdh86.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exeigfxdh86.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdh86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdh86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe -
Drops file in System32 directory 4 IoCs
Processes:
32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exeigfxdh86.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe File opened for modification C:\Windows\SysWOW64\igfxdh86.exe 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe File created C:\Windows\SysWOW64\igfxdh86.exe 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe File opened for modification C:\Windows\SysWOW64\ igfxdh86.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exeigfxdh86.exedescription pid process target process PID 628 set thread context of 1704 628 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe PID 1816 set thread context of 1792 1816 igfxdh86.exe igfxdh86.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exeigfxdh86.exepid process 1704 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe 1704 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe 1704 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe 1704 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe 1792 igfxdh86.exe 1792 igfxdh86.exe 1792 igfxdh86.exe 1792 igfxdh86.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exepid process 628 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exeigfxdh86.exeigfxdh86.exedescription pid process target process PID 628 wrote to memory of 1704 628 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe PID 628 wrote to memory of 1704 628 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe PID 628 wrote to memory of 1704 628 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe PID 628 wrote to memory of 1704 628 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe PID 628 wrote to memory of 1704 628 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe PID 628 wrote to memory of 1704 628 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe PID 628 wrote to memory of 1704 628 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe PID 1704 wrote to memory of 1816 1704 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe igfxdh86.exe PID 1704 wrote to memory of 1816 1704 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe igfxdh86.exe PID 1704 wrote to memory of 1816 1704 32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe igfxdh86.exe PID 1816 wrote to memory of 1792 1816 igfxdh86.exe igfxdh86.exe PID 1816 wrote to memory of 1792 1816 igfxdh86.exe igfxdh86.exe PID 1816 wrote to memory of 1792 1816 igfxdh86.exe igfxdh86.exe PID 1816 wrote to memory of 1792 1816 igfxdh86.exe igfxdh86.exe PID 1816 wrote to memory of 1792 1816 igfxdh86.exe igfxdh86.exe PID 1816 wrote to memory of 1792 1816 igfxdh86.exe igfxdh86.exe PID 1816 wrote to memory of 1792 1816 igfxdh86.exe igfxdh86.exe PID 1792 wrote to memory of 2932 1792 igfxdh86.exe Explorer.EXE PID 1792 wrote to memory of 2932 1792 igfxdh86.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe"C:\Users\Admin\AppData\Local\Temp\32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe"C:\Users\Admin\AppData\Local\Temp\32ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29.exe"3⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\igfxdh86.exe"C:\Windows\SysWOW64\igfxdh86.exe" C:\Users\Admin\AppData\Local\Temp\32FFCA~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\igfxdh86.exe"C:\Windows\SysWOW64\igfxdh86.exe" C:\Users\Admin\AppData\Local\Temp\32FFCA~1.EXE5⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5742909bc1d90ffce920ac50049133cfd
SHA11204c2640631f3997d935c706420059f246304f9
SHA25632ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29
SHA5124557aca727a54fc33a04066ee828123c39740bc3498764c40f0405193461a8ea2ce76b693ce33e8f8569121c154d297c9aee1f6822647dd023aa0cc81eea9e37
-
Filesize
212KB
MD5742909bc1d90ffce920ac50049133cfd
SHA11204c2640631f3997d935c706420059f246304f9
SHA25632ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29
SHA5124557aca727a54fc33a04066ee828123c39740bc3498764c40f0405193461a8ea2ce76b693ce33e8f8569121c154d297c9aee1f6822647dd023aa0cc81eea9e37
-
Filesize
212KB
MD5742909bc1d90ffce920ac50049133cfd
SHA11204c2640631f3997d935c706420059f246304f9
SHA25632ffca822febf9799d9a1b162d7b6625eaec503d94f44c7a721be3581c29ba29
SHA5124557aca727a54fc33a04066ee828123c39740bc3498764c40f0405193461a8ea2ce76b693ce33e8f8569121c154d297c9aee1f6822647dd023aa0cc81eea9e37