Analysis
-
max time kernel
140s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe
Resource
win10v2004-20221111-en
General
-
Target
c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe
-
Size
245KB
-
MD5
bf9385fcd89d544437da1fab25a4da2a
-
SHA1
1d9c6eaefbb2783ea96e5c344104dd2958678c2e
-
SHA256
c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8
-
SHA512
ed8507972e5c09e351013cec02adeac767cb43cfeee90e168aa5f63c08225626ab6e05e0614e84c97286b5023101c44317e6c188e960b9d1fcd644b4c9661dfd
-
SSDEEP
3072:Z6oWxCeelhuLpu4bji4bgtoAVq9iroHHrc36FBNTE43ZyUwDKKKKKKqH8T3ofHI:UxDBpu4bjiAMpIi7OBbHwDKKKKKK
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List wmplt64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmplt64.exe = "C:\\Windows\\SysWOW64\\wmplt64.exe:*:Enabled:Windows Media Protocal" wmplt64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List wmplt64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmplt64.exe = "C:\\Windows\\SysWOW64\\wmplt64.exe:*:Enabled:Windows Media Protocal" wmplt64.exe -
Executes dropped EXE 2 IoCs
pid Process 1620 wmplt64.exe 952 wmplt64.exe -
resource yara_rule behavioral1/memory/1460-55-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1460-57-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1460-58-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1460-60-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1460-64-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1460-65-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1460-66-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1460-67-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1460-86-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/952-87-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/952-88-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 952 wmplt64.exe -
Loads dropped DLL 2 IoCs
pid Process 1460 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe 1460 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run wmplt64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Media Protocal = "C:\\Windows\\SysWOW64\\wmplt64.exe" wmplt64.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplt64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmplt64.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmplt64.exe c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe File created C:\Windows\SysWOW64\wmplt64.exe c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe File opened for modification C:\Windows\SysWOW64\ wmplt64.exe File opened for modification C:\Windows\SysWOW64\wmplt64.exe wmplt64.exe File opened for modification C:\Windows\SysWOW64\ c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1504 set thread context of 1460 1504 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe 26 PID 1620 set thread context of 952 1620 wmplt64.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1460 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe 1460 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe 952 wmplt64.exe 952 wmplt64.exe 952 wmplt64.exe 952 wmplt64.exe 952 wmplt64.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1460 1504 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe 26 PID 1504 wrote to memory of 1460 1504 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe 26 PID 1504 wrote to memory of 1460 1504 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe 26 PID 1504 wrote to memory of 1460 1504 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe 26 PID 1504 wrote to memory of 1460 1504 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe 26 PID 1504 wrote to memory of 1460 1504 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe 26 PID 1504 wrote to memory of 1460 1504 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe 26 PID 1504 wrote to memory of 1460 1504 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe 26 PID 1460 wrote to memory of 1620 1460 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe 27 PID 1460 wrote to memory of 1620 1460 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe 27 PID 1460 wrote to memory of 1620 1460 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe 27 PID 1460 wrote to memory of 1620 1460 c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe 27 PID 1620 wrote to memory of 952 1620 wmplt64.exe 28 PID 1620 wrote to memory of 952 1620 wmplt64.exe 28 PID 1620 wrote to memory of 952 1620 wmplt64.exe 28 PID 1620 wrote to memory of 952 1620 wmplt64.exe 28 PID 1620 wrote to memory of 952 1620 wmplt64.exe 28 PID 1620 wrote to memory of 952 1620 wmplt64.exe 28 PID 1620 wrote to memory of 952 1620 wmplt64.exe 28 PID 1620 wrote to memory of 952 1620 wmplt64.exe 28 PID 952 wrote to memory of 1396 952 wmplt64.exe 14 PID 952 wrote to memory of 1396 952 wmplt64.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe"C:\Users\Admin\AppData\Local\Temp\c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe"C:\Users\Admin\AppData\Local\Temp\c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8.exe"3⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\wmplt64.exe"C:\Windows\SysWOW64\wmplt64.exe" C:\Users\Admin\AppData\Local\Temp\C2E5CC~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\wmplt64.exe"C:\Windows\SysWOW64\wmplt64.exe" C:\Users\Admin\AppData\Local\Temp\C2E5CC~1.EXE5⤵
- Modifies firewall policy service
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:952
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD5bf9385fcd89d544437da1fab25a4da2a
SHA11d9c6eaefbb2783ea96e5c344104dd2958678c2e
SHA256c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8
SHA512ed8507972e5c09e351013cec02adeac767cb43cfeee90e168aa5f63c08225626ab6e05e0614e84c97286b5023101c44317e6c188e960b9d1fcd644b4c9661dfd
-
Filesize
245KB
MD5bf9385fcd89d544437da1fab25a4da2a
SHA11d9c6eaefbb2783ea96e5c344104dd2958678c2e
SHA256c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8
SHA512ed8507972e5c09e351013cec02adeac767cb43cfeee90e168aa5f63c08225626ab6e05e0614e84c97286b5023101c44317e6c188e960b9d1fcd644b4c9661dfd
-
Filesize
245KB
MD5bf9385fcd89d544437da1fab25a4da2a
SHA11d9c6eaefbb2783ea96e5c344104dd2958678c2e
SHA256c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8
SHA512ed8507972e5c09e351013cec02adeac767cb43cfeee90e168aa5f63c08225626ab6e05e0614e84c97286b5023101c44317e6c188e960b9d1fcd644b4c9661dfd
-
Filesize
245KB
MD5bf9385fcd89d544437da1fab25a4da2a
SHA11d9c6eaefbb2783ea96e5c344104dd2958678c2e
SHA256c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8
SHA512ed8507972e5c09e351013cec02adeac767cb43cfeee90e168aa5f63c08225626ab6e05e0614e84c97286b5023101c44317e6c188e960b9d1fcd644b4c9661dfd
-
Filesize
245KB
MD5bf9385fcd89d544437da1fab25a4da2a
SHA11d9c6eaefbb2783ea96e5c344104dd2958678c2e
SHA256c2e5cca71e11404d3e99f9de1f0f789a990ffea56e8266a571e9f6ebb6151ba8
SHA512ed8507972e5c09e351013cec02adeac767cb43cfeee90e168aa5f63c08225626ab6e05e0614e84c97286b5023101c44317e6c188e960b9d1fcd644b4c9661dfd