Analysis
-
max time kernel
98s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 01:49
Static task
static1
Behavioral task
behavioral1
Sample
8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe
Resource
win10v2004-20220812-en
General
-
Target
8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe
-
Size
250KB
-
MD5
bf80b02a63eff8ff6222d97be469c9b3
-
SHA1
e2d5e673f47e07f9278ea88e9a47271be3aba62b
-
SHA256
8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b
-
SHA512
8a7a6115683fe9d466875ea2bbd0e57339ee116bf0afb876efc343bd23ce4f64e98736a47ec895a0420f0f7425acdaa4b6ade4c21e6aea4ac7d6385686e879c2
-
SSDEEP
3072:Xj99StNd3rZWTOwoIP/o7kTePQkwrzHqqL5BSbg1NEjYLg3qkbqC:z9atWS1IPkIePQlrzHqw6j1aBC
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxvl32.exe = "C:\\Windows\\SysWOW64\\igfxvl32.exe:*:Enabled:Intel Auto Updater" igfxvl32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List igfxvl32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxvl32.exe = "C:\\Windows\\SysWOW64\\igfxvl32.exe:*:Enabled:Intel Auto Updater" igfxvl32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List igfxvl32.exe -
Executes dropped EXE 2 IoCs
pid Process 2012 igfxvl32.exe 1812 igfxvl32.exe -
resource yara_rule behavioral1/memory/1208-55-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1208-57-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1208-58-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1208-60-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1208-64-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1208-65-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1208-66-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1208-67-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1208-68-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1208-84-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1812-88-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1812-89-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1812 igfxvl32.exe -
Loads dropped DLL 5 IoCs
pid Process 1208 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 1208 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 1992 WerFault.exe 1992 WerFault.exe 1992 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run igfxvl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Intel Auto Updater = "C:\\Windows\\SysWOW64\\igfxvl32.exe" igfxvl32.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxvl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxvl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe File opened for modification C:\Windows\SysWOW64\igfxvl32.exe 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe File created C:\Windows\SysWOW64\igfxvl32.exe 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe File opened for modification C:\Windows\SysWOW64\ igfxvl32.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1232 set thread context of 1208 1232 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 28 PID 2012 set thread context of 1812 2012 igfxvl32.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1992 1812 WerFault.exe 30 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1208 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 1208 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 1812 igfxvl32.exe 1812 igfxvl32.exe 1812 igfxvl32.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1208 1232 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 28 PID 1232 wrote to memory of 1208 1232 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 28 PID 1232 wrote to memory of 1208 1232 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 28 PID 1232 wrote to memory of 1208 1232 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 28 PID 1232 wrote to memory of 1208 1232 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 28 PID 1232 wrote to memory of 1208 1232 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 28 PID 1232 wrote to memory of 1208 1232 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 28 PID 1232 wrote to memory of 1208 1232 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 28 PID 1208 wrote to memory of 2012 1208 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 29 PID 1208 wrote to memory of 2012 1208 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 29 PID 1208 wrote to memory of 2012 1208 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 29 PID 1208 wrote to memory of 2012 1208 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 29 PID 2012 wrote to memory of 1812 2012 igfxvl32.exe 30 PID 2012 wrote to memory of 1812 2012 igfxvl32.exe 30 PID 2012 wrote to memory of 1812 2012 igfxvl32.exe 30 PID 2012 wrote to memory of 1812 2012 igfxvl32.exe 30 PID 2012 wrote to memory of 1812 2012 igfxvl32.exe 30 PID 2012 wrote to memory of 1812 2012 igfxvl32.exe 30 PID 2012 wrote to memory of 1812 2012 igfxvl32.exe 30 PID 2012 wrote to memory of 1812 2012 igfxvl32.exe 30 PID 1812 wrote to memory of 1276 1812 igfxvl32.exe 10 PID 1812 wrote to memory of 1276 1812 igfxvl32.exe 10 PID 1812 wrote to memory of 1992 1812 igfxvl32.exe 32 PID 1812 wrote to memory of 1992 1812 igfxvl32.exe 32 PID 1812 wrote to memory of 1992 1812 igfxvl32.exe 32 PID 1812 wrote to memory of 1992 1812 igfxvl32.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe"C:\Users\Admin\AppData\Local\Temp\8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe"C:\Users\Admin\AppData\Local\Temp\8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe"3⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\igfxvl32.exe"C:\Windows\SysWOW64\igfxvl32.exe" C:\Users\Admin\AppData\Local\Temp\8A1588~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\igfxvl32.exe"C:\Windows\SysWOW64\igfxvl32.exe" C:\Users\Admin\AppData\Local\Temp\8A1588~1.EXE5⤵
- Modifies firewall policy service
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 7286⤵
- Loads dropped DLL
- Program crash
PID:1992
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD5bf80b02a63eff8ff6222d97be469c9b3
SHA1e2d5e673f47e07f9278ea88e9a47271be3aba62b
SHA2568a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b
SHA5128a7a6115683fe9d466875ea2bbd0e57339ee116bf0afb876efc343bd23ce4f64e98736a47ec895a0420f0f7425acdaa4b6ade4c21e6aea4ac7d6385686e879c2
-
Filesize
250KB
MD5bf80b02a63eff8ff6222d97be469c9b3
SHA1e2d5e673f47e07f9278ea88e9a47271be3aba62b
SHA2568a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b
SHA5128a7a6115683fe9d466875ea2bbd0e57339ee116bf0afb876efc343bd23ce4f64e98736a47ec895a0420f0f7425acdaa4b6ade4c21e6aea4ac7d6385686e879c2
-
Filesize
250KB
MD5bf80b02a63eff8ff6222d97be469c9b3
SHA1e2d5e673f47e07f9278ea88e9a47271be3aba62b
SHA2568a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b
SHA5128a7a6115683fe9d466875ea2bbd0e57339ee116bf0afb876efc343bd23ce4f64e98736a47ec895a0420f0f7425acdaa4b6ade4c21e6aea4ac7d6385686e879c2
-
Filesize
250KB
MD5bf80b02a63eff8ff6222d97be469c9b3
SHA1e2d5e673f47e07f9278ea88e9a47271be3aba62b
SHA2568a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b
SHA5128a7a6115683fe9d466875ea2bbd0e57339ee116bf0afb876efc343bd23ce4f64e98736a47ec895a0420f0f7425acdaa4b6ade4c21e6aea4ac7d6385686e879c2
-
Filesize
250KB
MD5bf80b02a63eff8ff6222d97be469c9b3
SHA1e2d5e673f47e07f9278ea88e9a47271be3aba62b
SHA2568a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b
SHA5128a7a6115683fe9d466875ea2bbd0e57339ee116bf0afb876efc343bd23ce4f64e98736a47ec895a0420f0f7425acdaa4b6ade4c21e6aea4ac7d6385686e879c2
-
Filesize
250KB
MD5bf80b02a63eff8ff6222d97be469c9b3
SHA1e2d5e673f47e07f9278ea88e9a47271be3aba62b
SHA2568a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b
SHA5128a7a6115683fe9d466875ea2bbd0e57339ee116bf0afb876efc343bd23ce4f64e98736a47ec895a0420f0f7425acdaa4b6ade4c21e6aea4ac7d6385686e879c2
-
Filesize
250KB
MD5bf80b02a63eff8ff6222d97be469c9b3
SHA1e2d5e673f47e07f9278ea88e9a47271be3aba62b
SHA2568a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b
SHA5128a7a6115683fe9d466875ea2bbd0e57339ee116bf0afb876efc343bd23ce4f64e98736a47ec895a0420f0f7425acdaa4b6ade4c21e6aea4ac7d6385686e879c2
-
Filesize
250KB
MD5bf80b02a63eff8ff6222d97be469c9b3
SHA1e2d5e673f47e07f9278ea88e9a47271be3aba62b
SHA2568a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b
SHA5128a7a6115683fe9d466875ea2bbd0e57339ee116bf0afb876efc343bd23ce4f64e98736a47ec895a0420f0f7425acdaa4b6ade4c21e6aea4ac7d6385686e879c2