Analysis
-
max time kernel
148s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 01:09
Static task
static1
Behavioral task
behavioral1
Sample
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe
Resource
win10v2004-20220812-en
General
-
Target
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe
-
Size
227KB
-
MD5
1926d5d9eb5e4354f18083916de108f0
-
SHA1
f54ca406b5d189b19bdd2124c71660b921945cdb
-
SHA256
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020
-
SHA512
32a58a5d68ac70f719f4fb86ed198171ae70c0f34e3d5b623722de7e407ed66caf2d19d37deb3d1590063f5bb1ae2911e4226739f0a33f9e5714479c8e7e3ae5
-
SSDEEP
3072:mq6zDsoY9iUeCRvRpR5RhD/HzkfVtLrNFSDg6w3x5VdO3huCFOnYit8aQ:mqKC9X/L/cVtLxthdGhvOf
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 2 TTPs 10 IoCs
Processes:
reg.exereg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\sysdiag64.exe = "C:\\Windows\\sysdiag64.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MicrosoftCorp = "C:\\Windows\\sysdiag64.exe" fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe -
Executes dropped EXE 2 IoCs
Processes:
sysdiag64.exesysdiag64.exepid process 2888 sysdiag64.exe 260 sysdiag64.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicrosoftNAPC = "C:\\Windows\\sysdiag64.exe" fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysdiag64.exe = "C:\\Windows\\sysdiag64.exe" fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exesysdiag64.exedescription pid process target process PID 4056 set thread context of 4924 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 2888 set thread context of 260 2888 sysdiag64.exe sysdiag64.exe -
Drops file in Windows directory 4 IoCs
Processes:
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exesysdiag64.exedescription ioc process File created C:\Windows\sysdiag64.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe File opened for modification C:\Windows\sysdiag64.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe File opened for modification C:\Windows\sysdiag64.exe sysdiag64.exe File created C:\Windows\sysdiag64.exe sysdiag64.exe -
Modifies registry key 1 TTPs 4 IoCs
Processes:
reg.exereg.exereg.exereg.exepid process 1420 reg.exe 2796 reg.exe 2988 reg.exe 3140 reg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exesysdiag64.exepid process 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe 2888 sysdiag64.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.execmd.execmd.exefdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exesysdiag64.execmd.execmd.exedescription pid process target process PID 4056 wrote to memory of 5112 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 4056 wrote to memory of 5112 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 4056 wrote to memory of 5112 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 4056 wrote to memory of 1240 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 4056 wrote to memory of 1240 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 4056 wrote to memory of 1240 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 4056 wrote to memory of 4924 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 4056 wrote to memory of 4924 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 4056 wrote to memory of 4924 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 4056 wrote to memory of 4924 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 4056 wrote to memory of 4924 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 4056 wrote to memory of 4924 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 4056 wrote to memory of 4924 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 4056 wrote to memory of 4924 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 4056 wrote to memory of 4924 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 4056 wrote to memory of 4924 4056 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 5112 wrote to memory of 2796 5112 cmd.exe reg.exe PID 5112 wrote to memory of 2796 5112 cmd.exe reg.exe PID 5112 wrote to memory of 2796 5112 cmd.exe reg.exe PID 1240 wrote to memory of 1420 1240 cmd.exe reg.exe PID 1240 wrote to memory of 1420 1240 cmd.exe reg.exe PID 1240 wrote to memory of 1420 1240 cmd.exe reg.exe PID 4924 wrote to memory of 2888 4924 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe sysdiag64.exe PID 4924 wrote to memory of 2888 4924 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe sysdiag64.exe PID 4924 wrote to memory of 2888 4924 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe sysdiag64.exe PID 2888 wrote to memory of 4836 2888 sysdiag64.exe cmd.exe PID 2888 wrote to memory of 4836 2888 sysdiag64.exe cmd.exe PID 2888 wrote to memory of 4836 2888 sysdiag64.exe cmd.exe PID 2888 wrote to memory of 4448 2888 sysdiag64.exe cmd.exe PID 2888 wrote to memory of 4448 2888 sysdiag64.exe cmd.exe PID 2888 wrote to memory of 4448 2888 sysdiag64.exe cmd.exe PID 2888 wrote to memory of 260 2888 sysdiag64.exe sysdiag64.exe PID 2888 wrote to memory of 260 2888 sysdiag64.exe sysdiag64.exe PID 2888 wrote to memory of 260 2888 sysdiag64.exe sysdiag64.exe PID 2888 wrote to memory of 260 2888 sysdiag64.exe sysdiag64.exe PID 2888 wrote to memory of 260 2888 sysdiag64.exe sysdiag64.exe PID 2888 wrote to memory of 260 2888 sysdiag64.exe sysdiag64.exe PID 2888 wrote to memory of 260 2888 sysdiag64.exe sysdiag64.exe PID 2888 wrote to memory of 260 2888 sysdiag64.exe sysdiag64.exe PID 2888 wrote to memory of 260 2888 sysdiag64.exe sysdiag64.exe PID 2888 wrote to memory of 260 2888 sysdiag64.exe sysdiag64.exe PID 4836 wrote to memory of 2988 4836 cmd.exe reg.exe PID 4836 wrote to memory of 2988 4836 cmd.exe reg.exe PID 4836 wrote to memory of 2988 4836 cmd.exe reg.exe PID 4448 wrote to memory of 3140 4448 cmd.exe reg.exe PID 4448 wrote to memory of 3140 4448 cmd.exe reg.exe PID 4448 wrote to memory of 3140 4448 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe"C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe:*:Enabled:Windows Messanger" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe:*:Enabled:Windows Messanger" /f3⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe"C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\sysdiag64.exe"C:\Windows\sysdiag64.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\sysdiag64.exe" /t REG_SZ /d "C:\Windows\sysdiag64.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\sysdiag64.exe" /t REG_SZ /d "C:\Windows\sysdiag64.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Windows\sysdiag64.exe"C:\Windows\sysdiag64.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\sysdiag64.exeFilesize
227KB
MD51926d5d9eb5e4354f18083916de108f0
SHA1f54ca406b5d189b19bdd2124c71660b921945cdb
SHA256fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020
SHA51232a58a5d68ac70f719f4fb86ed198171ae70c0f34e3d5b623722de7e407ed66caf2d19d37deb3d1590063f5bb1ae2911e4226739f0a33f9e5714479c8e7e3ae5
-
C:\Windows\sysdiag64.exeFilesize
227KB
MD51926d5d9eb5e4354f18083916de108f0
SHA1f54ca406b5d189b19bdd2124c71660b921945cdb
SHA256fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020
SHA51232a58a5d68ac70f719f4fb86ed198171ae70c0f34e3d5b623722de7e407ed66caf2d19d37deb3d1590063f5bb1ae2911e4226739f0a33f9e5714479c8e7e3ae5
-
C:\Windows\sysdiag64.exeFilesize
227KB
MD51926d5d9eb5e4354f18083916de108f0
SHA1f54ca406b5d189b19bdd2124c71660b921945cdb
SHA256fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020
SHA51232a58a5d68ac70f719f4fb86ed198171ae70c0f34e3d5b623722de7e407ed66caf2d19d37deb3d1590063f5bb1ae2911e4226739f0a33f9e5714479c8e7e3ae5
-
memory/260-161-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/260-152-0x0000000000000000-mapping.dmp
-
memory/1240-136-0x0000000000000000-mapping.dmp
-
memory/1420-143-0x0000000000000000-mapping.dmp
-
memory/2796-142-0x0000000000000000-mapping.dmp
-
memory/2888-158-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2888-145-0x0000000000000000-mapping.dmp
-
memory/2988-157-0x0000000000000000-mapping.dmp
-
memory/3140-160-0x0000000000000000-mapping.dmp
-
memory/4056-141-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4056-134-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4448-151-0x0000000000000000-mapping.dmp
-
memory/4836-150-0x0000000000000000-mapping.dmp
-
memory/4924-144-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/4924-140-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/4924-138-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/4924-159-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/4924-137-0x0000000000000000-mapping.dmp
-
memory/5112-135-0x0000000000000000-mapping.dmp