Analysis
-
max time kernel
92s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 10:36
Static task
static1
Behavioral task
behavioral1
Sample
9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe
Resource
win10v2004-20220901-en
General
-
Target
9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe
-
Size
136KB
-
MD5
2e0080e607b406cb64f82d909a7f458e
-
SHA1
ce5ef756a358bb5faf5b92f1ebd6e7140ecc80ce
-
SHA256
9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671
-
SHA512
ce78a57865fecbc791e790d2dfb9c2e61369ed1bfd568acafbcfaf7f85b50ee34329d6f8d6922aec2e02650300149551ec3a5ba090f34afda1685e5e1dd13c7b
-
SSDEEP
3072:waBTBRR+7lzPZdGbhfwFIWNc8HJJPz2/CNSvR9UiFDrK5Py2mFGCtwk:wukJPubhfwFPpJPqCNSHFKPy2VU
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
wmpkc32.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List wmpkc32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmpkc32.exe = "C:\\Windows\\SysWOW64\\wmpkc32.exe:*:Enabled:WinMedia Config" wmpkc32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List wmpkc32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmpkc32.exe = "C:\\Windows\\SysWOW64\\wmpkc32.exe:*:Enabled:WinMedia Config" wmpkc32.exe -
Executes dropped EXE 2 IoCs
Processes:
wmpkc32.exewmpkc32.exepid process 1508 wmpkc32.exe 1800 wmpkc32.exe -
Processes:
resource yara_rule behavioral1/memory/1948-55-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1948-57-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1948-58-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1948-62-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1948-63-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1948-64-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1948-65-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1948-82-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1800-83-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/1800-84-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
wmpkc32.exepid process 1800 wmpkc32.exe -
Loads dropped DLL 2 IoCs
Processes:
9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exepid process 1948 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe 1948 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wmpkc32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run wmpkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinMedia Config = "C:\\Windows\\SysWOW64\\wmpkc32.exe" wmpkc32.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exewmpkc32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpkc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpkc32.exe -
Drops file in System32 directory 4 IoCs
Processes:
9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exewmpkc32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe File opened for modification C:\Windows\SysWOW64\wmpkc32.exe 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe File created C:\Windows\SysWOW64\wmpkc32.exe 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe File opened for modification C:\Windows\SysWOW64\ wmpkc32.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exewmpkc32.exedescription pid process target process PID 2000 set thread context of 1948 2000 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe PID 1508 set thread context of 1800 1508 wmpkc32.exe wmpkc32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exewmpkc32.exepid process 1948 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe 1948 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe 1800 wmpkc32.exe 1800 wmpkc32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exewmpkc32.exewmpkc32.exedescription pid process target process PID 2000 wrote to memory of 1948 2000 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe PID 2000 wrote to memory of 1948 2000 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe PID 2000 wrote to memory of 1948 2000 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe PID 2000 wrote to memory of 1948 2000 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe PID 2000 wrote to memory of 1948 2000 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe PID 2000 wrote to memory of 1948 2000 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe PID 2000 wrote to memory of 1948 2000 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe PID 1948 wrote to memory of 1508 1948 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe wmpkc32.exe PID 1948 wrote to memory of 1508 1948 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe wmpkc32.exe PID 1948 wrote to memory of 1508 1948 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe wmpkc32.exe PID 1948 wrote to memory of 1508 1948 9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe wmpkc32.exe PID 1508 wrote to memory of 1800 1508 wmpkc32.exe wmpkc32.exe PID 1508 wrote to memory of 1800 1508 wmpkc32.exe wmpkc32.exe PID 1508 wrote to memory of 1800 1508 wmpkc32.exe wmpkc32.exe PID 1508 wrote to memory of 1800 1508 wmpkc32.exe wmpkc32.exe PID 1508 wrote to memory of 1800 1508 wmpkc32.exe wmpkc32.exe PID 1508 wrote to memory of 1800 1508 wmpkc32.exe wmpkc32.exe PID 1508 wrote to memory of 1800 1508 wmpkc32.exe wmpkc32.exe PID 1800 wrote to memory of 1224 1800 wmpkc32.exe Explorer.EXE PID 1800 wrote to memory of 1224 1800 wmpkc32.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe"C:\Users\Admin\AppData\Local\Temp\9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe"C:\Users\Admin\AppData\Local\Temp\9c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671.exe"3⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\wmpkc32.exe"C:\Windows\SysWOW64\wmpkc32.exe" C:\Users\Admin\AppData\Local\Temp\9C999D~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\wmpkc32.exe"C:\Windows\SysWOW64\wmpkc32.exe" C:\Users\Admin\AppData\Local\Temp\9C999D~1.EXE5⤵
- Modifies firewall policy service
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD52e0080e607b406cb64f82d909a7f458e
SHA1ce5ef756a358bb5faf5b92f1ebd6e7140ecc80ce
SHA2569c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671
SHA512ce78a57865fecbc791e790d2dfb9c2e61369ed1bfd568acafbcfaf7f85b50ee34329d6f8d6922aec2e02650300149551ec3a5ba090f34afda1685e5e1dd13c7b
-
Filesize
136KB
MD52e0080e607b406cb64f82d909a7f458e
SHA1ce5ef756a358bb5faf5b92f1ebd6e7140ecc80ce
SHA2569c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671
SHA512ce78a57865fecbc791e790d2dfb9c2e61369ed1bfd568acafbcfaf7f85b50ee34329d6f8d6922aec2e02650300149551ec3a5ba090f34afda1685e5e1dd13c7b
-
Filesize
136KB
MD52e0080e607b406cb64f82d909a7f458e
SHA1ce5ef756a358bb5faf5b92f1ebd6e7140ecc80ce
SHA2569c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671
SHA512ce78a57865fecbc791e790d2dfb9c2e61369ed1bfd568acafbcfaf7f85b50ee34329d6f8d6922aec2e02650300149551ec3a5ba090f34afda1685e5e1dd13c7b
-
Filesize
136KB
MD52e0080e607b406cb64f82d909a7f458e
SHA1ce5ef756a358bb5faf5b92f1ebd6e7140ecc80ce
SHA2569c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671
SHA512ce78a57865fecbc791e790d2dfb9c2e61369ed1bfd568acafbcfaf7f85b50ee34329d6f8d6922aec2e02650300149551ec3a5ba090f34afda1685e5e1dd13c7b
-
Filesize
136KB
MD52e0080e607b406cb64f82d909a7f458e
SHA1ce5ef756a358bb5faf5b92f1ebd6e7140ecc80ce
SHA2569c999dddb53e73ad06c32679405917161cc56be6ceb1549b36d4108c8eea9671
SHA512ce78a57865fecbc791e790d2dfb9c2e61369ed1bfd568acafbcfaf7f85b50ee34329d6f8d6922aec2e02650300149551ec3a5ba090f34afda1685e5e1dd13c7b