Analysis
-
max time kernel
176s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 13:40
Static task
static1
Behavioral task
behavioral1
Sample
d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe
Resource
win10v2004-20220812-en
General
-
Target
d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe
-
Size
224KB
-
MD5
0d49ab9ea970a3146b43d7a8b738387d
-
SHA1
bf833829fa6a07af50f00fa3d66a457cf5d778ad
-
SHA256
d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710
-
SHA512
a3cfbb99d7a305cae7d6cbc983ccc74642d1530918e2b781a9a844aee46bee6ff40bb6cfab8d6d63d37e6c339a8c0122361649fb710740f2b9fd0848ac63aac3
-
SSDEEP
6144:fv8aWfVbAxePJkl6zUzMtWWuguGLDGlhHmAKMa/DLy/:MaQAxePJBz3W76IKMabU
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 2 IoCs
pid Process 1352 regsrv42.exe 4816 regsrv42.exe -
resource yara_rule behavioral2/memory/512-135-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/512-137-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/512-138-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/512-139-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4816-152-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/512-153-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4816-154-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4816-156-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation regsrv42.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation regsrv42.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum regsrv42.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 regsrv42.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe File opened for modification \??\PhysicalDrive0 regsrv42.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsrv42.exe d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe File opened for modification C:\Windows\SysWOW64\ d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe File opened for modification C:\Windows\SysWOW64\regsrv42.exe d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2316 set thread context of 512 2316 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 80 PID 1352 set thread context of 4816 1352 regsrv42.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 512 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 512 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 512 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 512 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 4816 regsrv42.exe 4816 regsrv42.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4816 regsrv42.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2316 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 1352 regsrv42.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2316 wrote to memory of 512 2316 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 80 PID 2316 wrote to memory of 512 2316 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 80 PID 2316 wrote to memory of 512 2316 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 80 PID 2316 wrote to memory of 512 2316 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 80 PID 2316 wrote to memory of 512 2316 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 80 PID 2316 wrote to memory of 512 2316 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 80 PID 2316 wrote to memory of 512 2316 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 80 PID 2316 wrote to memory of 512 2316 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 80 PID 512 wrote to memory of 1352 512 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 82 PID 512 wrote to memory of 1352 512 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 82 PID 512 wrote to memory of 1352 512 d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe 82 PID 1352 wrote to memory of 4816 1352 regsrv42.exe 83 PID 1352 wrote to memory of 4816 1352 regsrv42.exe 83 PID 1352 wrote to memory of 4816 1352 regsrv42.exe 83 PID 1352 wrote to memory of 4816 1352 regsrv42.exe 83 PID 1352 wrote to memory of 4816 1352 regsrv42.exe 83 PID 1352 wrote to memory of 4816 1352 regsrv42.exe 83 PID 1352 wrote to memory of 4816 1352 regsrv42.exe 83 PID 1352 wrote to memory of 4816 1352 regsrv42.exe 83 PID 4816 wrote to memory of 1732 4816 regsrv42.exe 84 PID 4816 wrote to memory of 1732 4816 regsrv42.exe 84 PID 4816 wrote to memory of 1732 4816 regsrv42.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe"C:\Users\Admin\AppData\Local\Temp\d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe"1⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exeC:\Users\Admin\AppData\Local\Temp\d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710.exe2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SysWOW64\regsrv42.exe"C:\Windows\system32\regsrv42.exe" C:\Users\Admin\AppData\Local\Temp\D3A4AA~1.EXE3⤵
- Executes dropped EXE
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\regsrv42.exeC:\Windows\SysWOW64\regsrv42.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\regsrv42.exe > nul5⤵PID:1732
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55343c1a8b203c162a3bf3870d9f50fd4
SHA104b5b886c20d88b57eea6d8ff882624a4ac1e51d
SHA256dc1d54dab6ec8c00f70137927504e4f222c8395f10760b6beecfcfa94e08249f
SHA512e0f50acb6061744e825a4051765cebf23e8c489b55b190739409d8a79bb08dac8f919247a4e5f65a015ea9c57d326bbef7ea045163915129e01f316c4958d949
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2629973501-4017243118-3254762364-1000\699c4b9cdebca7aaea5193cae8a50098_e32e1c79-b88e-4709-94fb-81034ca3398e
Filesize50B
MD55b63d4dd8c04c88c0e30e494ec6a609a
SHA1884d5a8bdc25fe794dc22ef9518009dcf0069d09
SHA2564d93c22555b3169e5c13716ca59b8b22892c69b3025aea841afe5259698102fd
SHA51215ff8551ac6b9de978050569bcdc26f44dfc06a0eaf445ac70fd45453a21bdafa3e4c8b4857d6a1c3226f4102a639682bdfb71d7b255062fb81a51c9126896cb
-
Filesize
224KB
MD50d49ab9ea970a3146b43d7a8b738387d
SHA1bf833829fa6a07af50f00fa3d66a457cf5d778ad
SHA256d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710
SHA512a3cfbb99d7a305cae7d6cbc983ccc74642d1530918e2b781a9a844aee46bee6ff40bb6cfab8d6d63d37e6c339a8c0122361649fb710740f2b9fd0848ac63aac3
-
Filesize
224KB
MD50d49ab9ea970a3146b43d7a8b738387d
SHA1bf833829fa6a07af50f00fa3d66a457cf5d778ad
SHA256d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710
SHA512a3cfbb99d7a305cae7d6cbc983ccc74642d1530918e2b781a9a844aee46bee6ff40bb6cfab8d6d63d37e6c339a8c0122361649fb710740f2b9fd0848ac63aac3
-
Filesize
224KB
MD50d49ab9ea970a3146b43d7a8b738387d
SHA1bf833829fa6a07af50f00fa3d66a457cf5d778ad
SHA256d3a4aa64e9e293da875922d32b3319cd732f1b555e1e58d6399d2977f179b710
SHA512a3cfbb99d7a305cae7d6cbc983ccc74642d1530918e2b781a9a844aee46bee6ff40bb6cfab8d6d63d37e6c339a8c0122361649fb710740f2b9fd0848ac63aac3