Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 19:00

General

  • Target

    bd264dc9338106147892b6862bce81c7aee17227771740cba364050bbbe92e2f.exe

  • Size

    272KB

  • MD5

    42336081866631ea1d378881a4f99a7a

  • SHA1

    afdde5642b71a34564251ed4e166cf195ba11465

  • SHA256

    bd264dc9338106147892b6862bce81c7aee17227771740cba364050bbbe92e2f

  • SHA512

    ffbdeac9043cda0ab6f063225b6a536b2457b64dac78827a3a3c12790c4f1250c8c63b967664afa23e69a7e13c0baaacce137b6084b62a84d0fc4d5cce1cb943

  • SSDEEP

    6144:B9FYQeeMiVusHFTtIM602a108XEWxLYAoanrxB7n2NP0ZQKcqTd/dJBuM7JKuDea:B9x31EWLkwjsAUJa

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Executes dropped EXE 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd264dc9338106147892b6862bce81c7aee17227771740cba364050bbbe92e2f.exe
    "C:\Users\Admin\AppData\Local\Temp\bd264dc9338106147892b6862bce81c7aee17227771740cba364050bbbe92e2f.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Users\Admin\AppData\Local\Temp\bd264dc9338106147892b6862bce81c7aee17227771740cba364050bbbe92e2f.exe
      "C:\Users\Admin\AppData\Local\Temp\bd264dc9338106147892b6862bce81c7aee17227771740cba364050bbbe92e2f.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Users\Admin\AppData\Roaming\scvhost.exe
        "C:\Users\Admin\AppData\Roaming\scvhost.exe"
        3⤵
        • Executes dropped EXE
        • Modifies Installed Components in the registry
        • Checks computer location settings
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:812
        • C:\Users\Admin\AppData\Roaming\scvhost.exe
          "C:\Users\Admin\AppData\Roaming\scvhost.exe"
          4⤵
          • Executes dropped EXE
          PID:1632
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AB5vXCpSoD0L3whxk.bat" "
          4⤵
            PID:2352
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AB5vXCpSoD0L3whxk.bat" "
        2⤵
          PID:2148

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\AB5vXCpSoD0L3whxk.bat

              Filesize

              216B

              MD5

              f52c6aef27e551fa3bb6a781d5f8e7b1

              SHA1

              9b4bbd64d78c9d9d8bc61b5ef00cc5173cca78f1

              SHA256

              2d110c587b26812f7565096a4cf5c19e0ec697595126189d234bde057fd49189

              SHA512

              9037b9828aea7e11f69f8560192457fccec7e6e61e0e392cd40d5591460491686420feafea698a9fa733f27b8d4ab50914342538290af5d49e8467adf0cc67fe

            • C:\Users\Admin\AppData\Local\Temp\AB5vXCpSoD0L3whxk.bat

              Filesize

              156B

              MD5

              86129a6a8940c1f85adc8d32b3c13e24

              SHA1

              8d8537884e155c0ab2ceda253d2bd01e7e796554

              SHA256

              7a1818626c5ca51868028505e384f6f9c0592682e576f95f71e11cffe4f0ce75

              SHA512

              c4c9e278b2a84ee9772282268cf6f09ead5ae4204efadc981fcc6caf5c35646001452f316f17d36922cf6ac69ef7831f0cee3a009138dbd48e8775b4e530f2cb

            • C:\Users\Admin\AppData\Roaming\scvhost.exe

              Filesize

              272KB

              MD5

              42336081866631ea1d378881a4f99a7a

              SHA1

              afdde5642b71a34564251ed4e166cf195ba11465

              SHA256

              bd264dc9338106147892b6862bce81c7aee17227771740cba364050bbbe92e2f

              SHA512

              ffbdeac9043cda0ab6f063225b6a536b2457b64dac78827a3a3c12790c4f1250c8c63b967664afa23e69a7e13c0baaacce137b6084b62a84d0fc4d5cce1cb943

            • C:\Users\Admin\AppData\Roaming\scvhost.exe

              Filesize

              272KB

              MD5

              42336081866631ea1d378881a4f99a7a

              SHA1

              afdde5642b71a34564251ed4e166cf195ba11465

              SHA256

              bd264dc9338106147892b6862bce81c7aee17227771740cba364050bbbe92e2f

              SHA512

              ffbdeac9043cda0ab6f063225b6a536b2457b64dac78827a3a3c12790c4f1250c8c63b967664afa23e69a7e13c0baaacce137b6084b62a84d0fc4d5cce1cb943

            • C:\Users\Admin\AppData\Roaming\scvhost.exe

              Filesize

              272KB

              MD5

              42336081866631ea1d378881a4f99a7a

              SHA1

              afdde5642b71a34564251ed4e166cf195ba11465

              SHA256

              bd264dc9338106147892b6862bce81c7aee17227771740cba364050bbbe92e2f

              SHA512

              ffbdeac9043cda0ab6f063225b6a536b2457b64dac78827a3a3c12790c4f1250c8c63b967664afa23e69a7e13c0baaacce137b6084b62a84d0fc4d5cce1cb943

            • C:\zip.exe

              Filesize

              272KB

              MD5

              42336081866631ea1d378881a4f99a7a

              SHA1

              afdde5642b71a34564251ed4e166cf195ba11465

              SHA256

              bd264dc9338106147892b6862bce81c7aee17227771740cba364050bbbe92e2f

              SHA512

              ffbdeac9043cda0ab6f063225b6a536b2457b64dac78827a3a3c12790c4f1250c8c63b967664afa23e69a7e13c0baaacce137b6084b62a84d0fc4d5cce1cb943

            • memory/1228-138-0x0000000000400000-0x000000000045E000-memory.dmp

              Filesize

              376KB

            • memory/1228-139-0x0000000000400000-0x000000000045E000-memory.dmp

              Filesize

              376KB

            • memory/1228-146-0x0000000000400000-0x000000000045E000-memory.dmp

              Filesize

              376KB

            • memory/1228-137-0x0000000000400000-0x000000000045E000-memory.dmp

              Filesize

              376KB

            • memory/1228-135-0x0000000000400000-0x000000000045E000-memory.dmp

              Filesize

              376KB

            • memory/1632-155-0x0000000000400000-0x000000000045E000-memory.dmp

              Filesize

              376KB

            • memory/1632-158-0x0000000000400000-0x000000000045E000-memory.dmp

              Filesize

              376KB