Analysis
-
max time kernel
180s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 01:49
Static task
static1
Behavioral task
behavioral1
Sample
8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe
Resource
win10v2004-20220812-en
General
-
Target
8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe
-
Size
250KB
-
MD5
bf80b02a63eff8ff6222d97be469c9b3
-
SHA1
e2d5e673f47e07f9278ea88e9a47271be3aba62b
-
SHA256
8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b
-
SHA512
8a7a6115683fe9d466875ea2bbd0e57339ee116bf0afb876efc343bd23ce4f64e98736a47ec895a0420f0f7425acdaa4b6ade4c21e6aea4ac7d6385686e879c2
-
SSDEEP
3072:Xj99StNd3rZWTOwoIP/o7kTePQkwrzHqqL5BSbg1NEjYLg3qkbqC:z9atWS1IPkIePQlrzHqw6j1aBC
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List igfxvl32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile igfxvl32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications igfxvl32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxvl32.exe = "C:\\Windows\\SysWOW64\\igfxvl32.exe:*:Enabled:Intel Auto Updater" igfxvl32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List igfxvl32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile igfxvl32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications igfxvl32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxvl32.exe = "C:\\Windows\\SysWOW64\\igfxvl32.exe:*:Enabled:Intel Auto Updater" igfxvl32.exe -
Executes dropped EXE 2 IoCs
pid Process 5100 igfxvl32.exe 4056 igfxvl32.exe -
resource yara_rule behavioral2/memory/1608-133-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1608-135-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1608-136-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1608-137-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/1608-143-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4056-146-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4056-147-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4056-148-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4056-149-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run igfxvl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Intel Auto Updater = "C:\\Windows\\SysWOW64\\igfxvl32.exe" igfxvl32.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxvl32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxvl32.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxvl32.exe File opened for modification C:\Windows\SysWOW64\igfxvl32.exe igfxvl32.exe File opened for modification C:\Windows\SysWOW64\ 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe File opened for modification C:\Windows\SysWOW64\igfxvl32.exe 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe File created C:\Windows\SysWOW64\igfxvl32.exe 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5040 set thread context of 1608 5040 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 79 PID 5100 set thread context of 4056 5100 igfxvl32.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1608 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 1608 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 1608 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 1608 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 4056 igfxvl32.exe 4056 igfxvl32.exe 4056 igfxvl32.exe 4056 igfxvl32.exe 4056 igfxvl32.exe 4056 igfxvl32.exe 4056 igfxvl32.exe 4056 igfxvl32.exe 4056 igfxvl32.exe 4056 igfxvl32.exe 4056 igfxvl32.exe 4056 igfxvl32.exe 4056 igfxvl32.exe 4056 igfxvl32.exe 4056 igfxvl32.exe 4056 igfxvl32.exe 4056 igfxvl32.exe 4056 igfxvl32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5040 wrote to memory of 1608 5040 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 79 PID 5040 wrote to memory of 1608 5040 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 79 PID 5040 wrote to memory of 1608 5040 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 79 PID 5040 wrote to memory of 1608 5040 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 79 PID 5040 wrote to memory of 1608 5040 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 79 PID 5040 wrote to memory of 1608 5040 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 79 PID 5040 wrote to memory of 1608 5040 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 79 PID 5040 wrote to memory of 1608 5040 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 79 PID 1608 wrote to memory of 5100 1608 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 80 PID 1608 wrote to memory of 5100 1608 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 80 PID 1608 wrote to memory of 5100 1608 8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe 80 PID 5100 wrote to memory of 4056 5100 igfxvl32.exe 81 PID 5100 wrote to memory of 4056 5100 igfxvl32.exe 81 PID 5100 wrote to memory of 4056 5100 igfxvl32.exe 81 PID 5100 wrote to memory of 4056 5100 igfxvl32.exe 81 PID 5100 wrote to memory of 4056 5100 igfxvl32.exe 81 PID 5100 wrote to memory of 4056 5100 igfxvl32.exe 81 PID 5100 wrote to memory of 4056 5100 igfxvl32.exe 81 PID 5100 wrote to memory of 4056 5100 igfxvl32.exe 81 PID 4056 wrote to memory of 380 4056 igfxvl32.exe 37 PID 4056 wrote to memory of 380 4056 igfxvl32.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe"C:\Users\Admin\AppData\Local\Temp\8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe"C:\Users\Admin\AppData\Local\Temp\8a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b.exe"3⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\igfxvl32.exe"C:\Windows\SysWOW64\igfxvl32.exe" C:\Users\Admin\AppData\Local\Temp\8A1588~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\igfxvl32.exe"C:\Windows\SysWOW64\igfxvl32.exe" C:\Users\Admin\AppData\Local\Temp\8A1588~1.EXE5⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4056
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD5bf80b02a63eff8ff6222d97be469c9b3
SHA1e2d5e673f47e07f9278ea88e9a47271be3aba62b
SHA2568a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b
SHA5128a7a6115683fe9d466875ea2bbd0e57339ee116bf0afb876efc343bd23ce4f64e98736a47ec895a0420f0f7425acdaa4b6ade4c21e6aea4ac7d6385686e879c2
-
Filesize
250KB
MD5bf80b02a63eff8ff6222d97be469c9b3
SHA1e2d5e673f47e07f9278ea88e9a47271be3aba62b
SHA2568a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b
SHA5128a7a6115683fe9d466875ea2bbd0e57339ee116bf0afb876efc343bd23ce4f64e98736a47ec895a0420f0f7425acdaa4b6ade4c21e6aea4ac7d6385686e879c2
-
Filesize
250KB
MD5bf80b02a63eff8ff6222d97be469c9b3
SHA1e2d5e673f47e07f9278ea88e9a47271be3aba62b
SHA2568a1588400910c0c05beb3b4f59c0392ad541bbca9aad50e9fbf4d220e1af115b
SHA5128a7a6115683fe9d466875ea2bbd0e57339ee116bf0afb876efc343bd23ce4f64e98736a47ec895a0420f0f7425acdaa4b6ade4c21e6aea4ac7d6385686e879c2