Analysis
-
max time kernel
149s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe
Resource
win10v2004-20220812-en
General
-
Target
67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe
-
Size
204KB
-
MD5
e0645978c758b3a5b4d96a5a0a37ff64
-
SHA1
9564de281369f4d8bc9253596bb7c15f3f970cc4
-
SHA256
67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b
-
SHA512
7473eb01a90b739c7ffb94bd32dd77531daf19688086ca82416a41921e119369c4df2e6599033c9ecbaf346bfbd0ac5a3d1d35be993d3183e18bb0071b2ee9fc
-
SSDEEP
3072:VD/rDkIFvYwWkr66AOq+sIcvax+zlu2KOlXAharwCoDUC8twEw5UMb:BcON+zluZc1t9w
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 2 IoCs
pid Process 1784 csrss.exe 1068 csrss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Remote Registry Service = "csrss.exe" 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1608 set thread context of 1984 1608 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe 26 PID 1784 set thread context of 1068 1784 csrss.exe 28 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\csrss.exe 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe File opened for modification C:\Windows\csrss.exe 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1608 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe 1784 csrss.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1608 wrote to memory of 1984 1608 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe 26 PID 1608 wrote to memory of 1984 1608 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe 26 PID 1608 wrote to memory of 1984 1608 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe 26 PID 1608 wrote to memory of 1984 1608 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe 26 PID 1608 wrote to memory of 1984 1608 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe 26 PID 1608 wrote to memory of 1984 1608 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe 26 PID 1608 wrote to memory of 1984 1608 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe 26 PID 1608 wrote to memory of 1984 1608 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe 26 PID 1608 wrote to memory of 1984 1608 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe 26 PID 1984 wrote to memory of 1784 1984 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe 27 PID 1984 wrote to memory of 1784 1984 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe 27 PID 1984 wrote to memory of 1784 1984 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe 27 PID 1984 wrote to memory of 1784 1984 67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe 27 PID 1784 wrote to memory of 1068 1784 csrss.exe 28 PID 1784 wrote to memory of 1068 1784 csrss.exe 28 PID 1784 wrote to memory of 1068 1784 csrss.exe 28 PID 1784 wrote to memory of 1068 1784 csrss.exe 28 PID 1784 wrote to memory of 1068 1784 csrss.exe 28 PID 1784 wrote to memory of 1068 1784 csrss.exe 28 PID 1784 wrote to memory of 1068 1784 csrss.exe 28 PID 1784 wrote to memory of 1068 1784 csrss.exe 28 PID 1784 wrote to memory of 1068 1784 csrss.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe"C:\Users\Admin\AppData\Local\Temp\67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe"C:\Users\Admin\AppData\Local\Temp\67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\csrss.exe"C:\Windows\csrss.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\csrss.exe"C:\Windows\csrss.exe"4⤵
- Executes dropped EXE
PID:1068
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5e0645978c758b3a5b4d96a5a0a37ff64
SHA19564de281369f4d8bc9253596bb7c15f3f970cc4
SHA25667ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b
SHA5127473eb01a90b739c7ffb94bd32dd77531daf19688086ca82416a41921e119369c4df2e6599033c9ecbaf346bfbd0ac5a3d1d35be993d3183e18bb0071b2ee9fc
-
Filesize
204KB
MD5e0645978c758b3a5b4d96a5a0a37ff64
SHA19564de281369f4d8bc9253596bb7c15f3f970cc4
SHA25667ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b
SHA5127473eb01a90b739c7ffb94bd32dd77531daf19688086ca82416a41921e119369c4df2e6599033c9ecbaf346bfbd0ac5a3d1d35be993d3183e18bb0071b2ee9fc
-
Filesize
204KB
MD5e0645978c758b3a5b4d96a5a0a37ff64
SHA19564de281369f4d8bc9253596bb7c15f3f970cc4
SHA25667ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b
SHA5127473eb01a90b739c7ffb94bd32dd77531daf19688086ca82416a41921e119369c4df2e6599033c9ecbaf346bfbd0ac5a3d1d35be993d3183e18bb0071b2ee9fc