Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 14:49
Behavioral task
behavioral1
Sample
0231c552de04a30b1c9cb0ff974de9b9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0231c552de04a30b1c9cb0ff974de9b9.exe
Resource
win10v2004-20231215-en
General
-
Target
0231c552de04a30b1c9cb0ff974de9b9.exe
-
Size
39KB
-
MD5
0231c552de04a30b1c9cb0ff974de9b9
-
SHA1
df0f3b64f630bad3038a6cea2caf975c9cb5bc05
-
SHA256
bd243f4ad846d2f5c47bf4f5afa06a17c5f1701fc26ebeb11918e3f6f14fb59a
-
SHA512
b798dce8cd47e8e66fca6827eb3fed20fbfa12d0f11d4452aec75a269838768048c264ce905355af1f9a3cc45864855ccfecc521724b5b3da979b715459dc8fa
-
SSDEEP
768:/V5EnP/lEn2mpqFj0mYH5/yTut9/lKlGKaui+n6taC2TX8Kjvp4wwik:/VaHlEn5p2jIZl9/lKlGuioDpphwik
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\wxptdi.sys 520.exe -
Executes dropped EXE 1 IoCs
pid Process 2116 520.exe -
Loads dropped DLL 2 IoCs
pid Process 2276 0231c552de04a30b1c9cb0ff974de9b9.exe 2276 0231c552de04a30b1c9cb0ff974de9b9.exe -
resource yara_rule behavioral1/memory/2276-0-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2276-14-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\520.exe 0231c552de04a30b1c9cb0ff974de9b9.exe -
Kills process with taskkill 1 IoCs
pid Process 1968 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2116 520.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSystemtimePrivilege 2276 0231c552de04a30b1c9cb0ff974de9b9.exe Token: SeSystemtimePrivilege 2276 0231c552de04a30b1c9cb0ff974de9b9.exe Token: SeSystemtimePrivilege 2276 0231c552de04a30b1c9cb0ff974de9b9.exe Token: SeSystemtimePrivilege 2276 0231c552de04a30b1c9cb0ff974de9b9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2276 0231c552de04a30b1c9cb0ff974de9b9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1968 2276 0231c552de04a30b1c9cb0ff974de9b9.exe 28 PID 2276 wrote to memory of 1968 2276 0231c552de04a30b1c9cb0ff974de9b9.exe 28 PID 2276 wrote to memory of 1968 2276 0231c552de04a30b1c9cb0ff974de9b9.exe 28 PID 2276 wrote to memory of 1968 2276 0231c552de04a30b1c9cb0ff974de9b9.exe 28 PID 2276 wrote to memory of 2116 2276 0231c552de04a30b1c9cb0ff974de9b9.exe 29 PID 2276 wrote to memory of 2116 2276 0231c552de04a30b1c9cb0ff974de9b9.exe 29 PID 2276 wrote to memory of 2116 2276 0231c552de04a30b1c9cb0ff974de9b9.exe 29 PID 2276 wrote to memory of 2116 2276 0231c552de04a30b1c9cb0ff974de9b9.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0231c552de04a30b1c9cb0ff974de9b9.exe"C:\Users\Admin\AppData\Local\Temp\0231c552de04a30b1c9cb0ff974de9b9.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\taskkill.exetaskkill 360tray.exe2⤵
- Kills process with taskkill
PID:1968
-
-
C:\Windows\SysWOW64\520.exeC:\Windows\system32\520.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD54d5ea81194beefe476e09cdfc335a7e9
SHA11f6b0f7a982ba0ba2050709790fa22f83942705a
SHA2567d7ef942d331e811e63a1f210aa197043b8c634e4e6fed3e2b356a5e879451a2
SHA5126b6e8bef12eedf61e938149125ac7ba78b0912d8dcf8bf1c82f47973d22e3a1bc9f580862e081c663607ce99b181b3812d7208ed7e9a9d78c9cb994912245e8a