Analysis

  • max time kernel
    149s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 23:34

General

  • Target

    67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe

  • Size

    204KB

  • MD5

    e0645978c758b3a5b4d96a5a0a37ff64

  • SHA1

    9564de281369f4d8bc9253596bb7c15f3f970cc4

  • SHA256

    67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b

  • SHA512

    7473eb01a90b739c7ffb94bd32dd77531daf19688086ca82416a41921e119369c4df2e6599033c9ecbaf346bfbd0ac5a3d1d35be993d3183e18bb0071b2ee9fc

  • SSDEEP

    3072:VD/rDkIFvYwWkr66AOq+sIcvax+zlu2KOlXAharwCoDUC8twEw5UMb:BcON+zluZc1t9w

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe
    "C:\Users\Admin\AppData\Local\Temp\67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Users\Admin\AppData\Local\Temp\67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe
      "C:\Users\Admin\AppData\Local\Temp\67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\csrss.exe
        "C:\Windows\csrss.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1784
        • C:\Windows\csrss.exe
          "C:\Windows\csrss.exe"
          4⤵
          • Executes dropped EXE
          PID:1068

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\csrss.exe

    Filesize

    204KB

    MD5

    e0645978c758b3a5b4d96a5a0a37ff64

    SHA1

    9564de281369f4d8bc9253596bb7c15f3f970cc4

    SHA256

    67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b

    SHA512

    7473eb01a90b739c7ffb94bd32dd77531daf19688086ca82416a41921e119369c4df2e6599033c9ecbaf346bfbd0ac5a3d1d35be993d3183e18bb0071b2ee9fc

  • C:\Windows\csrss.exe

    Filesize

    204KB

    MD5

    e0645978c758b3a5b4d96a5a0a37ff64

    SHA1

    9564de281369f4d8bc9253596bb7c15f3f970cc4

    SHA256

    67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b

    SHA512

    7473eb01a90b739c7ffb94bd32dd77531daf19688086ca82416a41921e119369c4df2e6599033c9ecbaf346bfbd0ac5a3d1d35be993d3183e18bb0071b2ee9fc

  • C:\Windows\csrss.exe

    Filesize

    204KB

    MD5

    e0645978c758b3a5b4d96a5a0a37ff64

    SHA1

    9564de281369f4d8bc9253596bb7c15f3f970cc4

    SHA256

    67ca6587860f9d0df59e660eb21891dda49368ee004705c25b8dc613ea9fa37b

    SHA512

    7473eb01a90b739c7ffb94bd32dd77531daf19688086ca82416a41921e119369c4df2e6599033c9ecbaf346bfbd0ac5a3d1d35be993d3183e18bb0071b2ee9fc

  • memory/1068-91-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1068-90-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1068-88-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1984-68-0x0000000075A91000-0x0000000075A93000-memory.dmp

    Filesize

    8KB

  • memory/1984-57-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1984-67-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1984-73-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1984-74-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1984-64-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1984-62-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1984-60-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1984-56-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1984-59-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB