Analysis
-
max time kernel
167s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe
Resource
win10v2004-20220812-en
General
-
Target
2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe
-
Size
107KB
-
MD5
274a992b90460b31dfb26595a69606d1
-
SHA1
9a76f9be0787dae4730f6577beb93b649ce5b9ea
-
SHA256
2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4
-
SHA512
e318ef892a5334799cfe1b0e68a14db773700313215f7838503aa81c70cebfa6b57c7fbf2eeff84e2cc7fd1c1ef530f7847401c756bfe77b87b469a2c55ae28e
-
SSDEEP
3072:GfgUXWFKNlw1bbhJltZrpRV7Nwh2Ep69t96ghyP:igUXWF+m1bbJthpz7Nwh2GK6gm
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\system32\\drivers\\notepad.exe" 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe -
Drops file in Drivers directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\notepad.exe 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe File opened for modification C:\Windows\SysWOW64\drivers\notepad.exe 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe File opened for modification C:\Windows\SysWOW64\drivers\notepad.exe notepad.exe File created C:\Windows\SysWOW64\drivers\notepad.exe notepad.exe -
Executes dropped EXE 2 IoCs
pid Process 4892 notepad.exe 4864 notepad.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\system32\\drivers\\notepad.exe" 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4792 set thread context of 3448 4792 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 80 PID 4892 set thread context of 4864 4892 notepad.exe 82 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\logfile32.txt notepad.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3448 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 3448 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 3448 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 3448 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4792 wrote to memory of 3448 4792 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 80 PID 4792 wrote to memory of 3448 4792 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 80 PID 4792 wrote to memory of 3448 4792 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 80 PID 4792 wrote to memory of 3448 4792 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 80 PID 4792 wrote to memory of 3448 4792 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 80 PID 3448 wrote to memory of 4892 3448 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 81 PID 3448 wrote to memory of 4892 3448 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 81 PID 3448 wrote to memory of 4892 3448 2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe 81 PID 4892 wrote to memory of 4864 4892 notepad.exe 82 PID 4892 wrote to memory of 4864 4892 notepad.exe 82 PID 4892 wrote to memory of 4864 4892 notepad.exe 82 PID 4892 wrote to memory of 4864 4892 notepad.exe 82 PID 4892 wrote to memory of 4864 4892 notepad.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe"C:\Users\Admin\AppData\Local\Temp\2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe"C:\Users\Admin\AppData\Local\Temp\2d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4.exe"2⤵
- Adds policy Run key to start application
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\drivers\notepad.exe"C:\Windows\system32\drivers\notepad.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\drivers\notepad.exe"C:\Windows\SysWOW64\drivers\notepad.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:4864
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD5274a992b90460b31dfb26595a69606d1
SHA19a76f9be0787dae4730f6577beb93b649ce5b9ea
SHA2562d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4
SHA512e318ef892a5334799cfe1b0e68a14db773700313215f7838503aa81c70cebfa6b57c7fbf2eeff84e2cc7fd1c1ef530f7847401c756bfe77b87b469a2c55ae28e
-
Filesize
107KB
MD5274a992b90460b31dfb26595a69606d1
SHA19a76f9be0787dae4730f6577beb93b649ce5b9ea
SHA2562d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4
SHA512e318ef892a5334799cfe1b0e68a14db773700313215f7838503aa81c70cebfa6b57c7fbf2eeff84e2cc7fd1c1ef530f7847401c756bfe77b87b469a2c55ae28e
-
Filesize
107KB
MD5274a992b90460b31dfb26595a69606d1
SHA19a76f9be0787dae4730f6577beb93b649ce5b9ea
SHA2562d5df17c2868e43aea00695988921641a9367fba71338db3f75bfab5000062c4
SHA512e318ef892a5334799cfe1b0e68a14db773700313215f7838503aa81c70cebfa6b57c7fbf2eeff84e2cc7fd1c1ef530f7847401c756bfe77b87b469a2c55ae28e