Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 01:05
Static task
static1
Behavioral task
behavioral1
Sample
2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe
Resource
win10v2004-20220812-en
General
-
Target
2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe
-
Size
107KB
-
MD5
274a992b90460b31dfb26595a69606d1
-
SHA1
9a76f9be0787dae4730f6577beb93b649ce5b9ea
-
SHA256
2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4
-
SHA512
e318ef892a5334799cfe1b0e68a14db773700313215f7838503aa81c70cebfa6b57c7fbf2eeff84e2cc7fd1c1ef530f7847401c756bfe77b87b469a2c55ae28e
-
SSDEEP
3072:GfgUXWFKNlw1bbhJltZrpRV7Nwh2Ep69t96ghyP:igUXWF+m1bbJthpz7Nwh2GK6gm
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\system32\\drivers\\notepad.exe" 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe -
Drops file in Drivers directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\notepad.exe 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe File opened for modification C:\Windows\SysWOW64\drivers\notepad.exe 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe File opened for modification C:\Windows\SysWOW64\drivers\notepad.exe notepad.exe File created C:\Windows\SysWOW64\drivers\notepad.exe notepad.exe -
Executes dropped EXE 2 IoCs
pid Process 320 notepad.exe 456 notepad.exe -
Loads dropped DLL 2 IoCs
pid Process 892 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 892 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\system32\\drivers\\notepad.exe" 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 980 set thread context of 892 980 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 27 PID 320 set thread context of 456 320 notepad.exe 29 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\logfile32.txt notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 892 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 892 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 980 wrote to memory of 892 980 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 27 PID 980 wrote to memory of 892 980 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 27 PID 980 wrote to memory of 892 980 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 27 PID 980 wrote to memory of 892 980 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 27 PID 980 wrote to memory of 892 980 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 27 PID 980 wrote to memory of 892 980 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 27 PID 892 wrote to memory of 320 892 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 28 PID 892 wrote to memory of 320 892 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 28 PID 892 wrote to memory of 320 892 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 28 PID 892 wrote to memory of 320 892 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 28 PID 320 wrote to memory of 456 320 notepad.exe 29 PID 320 wrote to memory of 456 320 notepad.exe 29 PID 320 wrote to memory of 456 320 notepad.exe 29 PID 320 wrote to memory of 456 320 notepad.exe 29 PID 320 wrote to memory of 456 320 notepad.exe 29 PID 320 wrote to memory of 456 320 notepad.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe"C:\Users\Admin\AppData\Local\Temp\2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe"C:\Users\Admin\AppData\Local\Temp\2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe"2⤵
- Adds policy Run key to start application
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\drivers\notepad.exe"C:\Windows\system32\drivers\notepad.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\drivers\notepad.exe"C:\Windows\SysWOW64\drivers\notepad.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:456
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD5274a992b90460b31dfb26595a69606d1
SHA19a76f9be0787dae4730f6577beb93b649ce5b9ea
SHA2562d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4
SHA512e318ef892a5334799cfe1b0e68a14db773700313215f7838503aa81c70cebfa6b57c7fbf2eeff84e2cc7fd1c1ef530f7847401c756bfe77b87b469a2c55ae28e
-
Filesize
107KB
MD5274a992b90460b31dfb26595a69606d1
SHA19a76f9be0787dae4730f6577beb93b649ce5b9ea
SHA2562d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4
SHA512e318ef892a5334799cfe1b0e68a14db773700313215f7838503aa81c70cebfa6b57c7fbf2eeff84e2cc7fd1c1ef530f7847401c756bfe77b87b469a2c55ae28e
-
Filesize
107KB
MD5274a992b90460b31dfb26595a69606d1
SHA19a76f9be0787dae4730f6577beb93b649ce5b9ea
SHA2562d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4
SHA512e318ef892a5334799cfe1b0e68a14db773700313215f7838503aa81c70cebfa6b57c7fbf2eeff84e2cc7fd1c1ef530f7847401c756bfe77b87b469a2c55ae28e
-
Filesize
107KB
MD5274a992b90460b31dfb26595a69606d1
SHA19a76f9be0787dae4730f6577beb93b649ce5b9ea
SHA2562d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4
SHA512e318ef892a5334799cfe1b0e68a14db773700313215f7838503aa81c70cebfa6b57c7fbf2eeff84e2cc7fd1c1ef530f7847401c756bfe77b87b469a2c55ae28e
-
Filesize
107KB
MD5274a992b90460b31dfb26595a69606d1
SHA19a76f9be0787dae4730f6577beb93b649ce5b9ea
SHA2562d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4
SHA512e318ef892a5334799cfe1b0e68a14db773700313215f7838503aa81c70cebfa6b57c7fbf2eeff84e2cc7fd1c1ef530f7847401c756bfe77b87b469a2c55ae28e