Analysis
-
max time kernel
9s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
1ba73e58924afe9aa6e88161bfb3adc4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ba73e58924afe9aa6e88161bfb3adc4.exe
Resource
win10v2004-20231215-en
General
-
Target
1ba73e58924afe9aa6e88161bfb3adc4.exe
-
Size
168KB
-
MD5
1ba73e58924afe9aa6e88161bfb3adc4
-
SHA1
9dc45648c7e3847dad43f8fe6c0a930f79020108
-
SHA256
e15fac847d6df2ec36478decdb6dddee812f95b6a3d56705513d72fbb6124696
-
SHA512
d025f3f6d8c2b002ada73d5943f4d1fcdd13744647b13d3619b9ba7efac11619a9ea6275a7772b89bdd5f21c95fcbed3aa38b637a8fe813f9cccabf7666fb81b
-
SSDEEP
3072:838Nmr19fQK5l5XgfWnDNVAQxLjAHq9VQFM0TTziItBxHKvCpfBjtGqk7CgWH:Ar19f6gLsBFm2d0CpzOWH
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
resource yara_rule behavioral2/memory/4940-38-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 1ba73e58924afe9aa6e88161bfb3adc4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 1ba73e58924afe9aa6e88161bfb3adc4.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ 1ba73e58924afe9aa6e88161bfb3adc4.exe File opened for modification C:\Windows\SysWOW64\igfxwk32.exe 1ba73e58924afe9aa6e88161bfb3adc4.exe File created C:\Windows\SysWOW64\igfxwk32.exe 1ba73e58924afe9aa6e88161bfb3adc4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2792 set thread context of 4940 2792 1ba73e58924afe9aa6e88161bfb3adc4.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4940 1ba73e58924afe9aa6e88161bfb3adc4.exe 4940 1ba73e58924afe9aa6e88161bfb3adc4.exe 4940 1ba73e58924afe9aa6e88161bfb3adc4.exe 4940 1ba73e58924afe9aa6e88161bfb3adc4.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2792 wrote to memory of 4940 2792 1ba73e58924afe9aa6e88161bfb3adc4.exe 94 PID 2792 wrote to memory of 4940 2792 1ba73e58924afe9aa6e88161bfb3adc4.exe 94 PID 2792 wrote to memory of 4940 2792 1ba73e58924afe9aa6e88161bfb3adc4.exe 94 PID 2792 wrote to memory of 4940 2792 1ba73e58924afe9aa6e88161bfb3adc4.exe 94 PID 2792 wrote to memory of 4940 2792 1ba73e58924afe9aa6e88161bfb3adc4.exe 94 PID 2792 wrote to memory of 4940 2792 1ba73e58924afe9aa6e88161bfb3adc4.exe 94 PID 2792 wrote to memory of 4940 2792 1ba73e58924afe9aa6e88161bfb3adc4.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ba73e58924afe9aa6e88161bfb3adc4.exe"C:\Users\Admin\AppData\Local\Temp\1ba73e58924afe9aa6e88161bfb3adc4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\1ba73e58924afe9aa6e88161bfb3adc4.exe"C:\Users\Admin\AppData\Local\Temp\1ba73e58924afe9aa6e88161bfb3adc4.exe"2⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4940 -
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Users\Admin\AppData\Local\Temp\1BA73E~1.EXE3⤵PID:3492
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Users\Admin\AppData\Local\Temp\1BA73E~1.EXE4⤵PID:692
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe5⤵PID:4392
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe6⤵PID:4860
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe7⤵PID:4328
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe8⤵PID:3772
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe9⤵PID:2772
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe10⤵PID:4864
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe11⤵PID:2760
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe12⤵PID:1928
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe13⤵PID:3680
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe14⤵PID:4848
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe15⤵PID:2812
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe16⤵PID:992
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe17⤵PID:1820
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe18⤵PID:1256
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe19⤵PID:3432
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe20⤵PID:2424
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe21⤵PID:3060
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe22⤵PID:2876
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe23⤵PID:4576
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe24⤵PID:4404
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe25⤵PID:4632
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe26⤵PID:2264
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe27⤵PID:3872
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe28⤵PID:4380
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe29⤵PID:5076
-
C:\Windows\SysWOW64\igfxwk32.exe"C:\Windows\system32\igfxwk32.exe" C:\Windows\SysWOW64\igfxwk32.exe30⤵PID:1680
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD51ba73e58924afe9aa6e88161bfb3adc4
SHA19dc45648c7e3847dad43f8fe6c0a930f79020108
SHA256e15fac847d6df2ec36478decdb6dddee812f95b6a3d56705513d72fbb6124696
SHA512d025f3f6d8c2b002ada73d5943f4d1fcdd13744647b13d3619b9ba7efac11619a9ea6275a7772b89bdd5f21c95fcbed3aa38b637a8fe813f9cccabf7666fb81b