Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
04232afde988dbf882ed66355fd24b30.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04232afde988dbf882ed66355fd24b30.exe
Resource
win10v2004-20231215-en
General
-
Target
04232afde988dbf882ed66355fd24b30.exe
-
Size
258KB
-
MD5
04232afde988dbf882ed66355fd24b30
-
SHA1
a17104dc77f2b6ffa3d431d2d4810e592a735287
-
SHA256
21ba7b8f019fb3966b00a61aa3d8ee3f9aedbc7b7923d80a40e4adb4e922ca42
-
SHA512
b385ed1ec7d8e6e156a75de93d5d8410f7a1b4c7259bff69b83786d850e09b78d29c9cab6ae0e70c673985e2849584f00d5e4dc887f59c093952be67a520dd41
-
SSDEEP
3072:+cavt6S/4etFqwTR2C+KaD0bbNlknbPFjufeNsVhAj6N2SQkOpCGcuHiC55hU1rC:+vVREyJubtumNAI6N26a
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications igfxbh32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxbh32.exe = "C:\\Windows\\SysWOW64\\igfxbh32.exe:*:Enabled:Intel iDisplay Hub" igfxbh32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List igfxbh32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile igfxbh32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications igfxbh32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxbh32.exe = "C:\\Windows\\SysWOW64\\igfxbh32.exe:*:Enabled:Intel iDisplay Hub" igfxbh32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List igfxbh32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile igfxbh32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 04232afde988dbf882ed66355fd24b30.exe -
Deletes itself 1 IoCs
pid Process 3932 igfxbh32.exe -
Executes dropped EXE 2 IoCs
pid Process 4072 igfxbh32.exe 3932 igfxbh32.exe -
resource yara_rule behavioral2/memory/4156-0-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4156-2-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4156-3-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4156-4-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/4156-38-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3932-45-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3932-46-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3932-47-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3932-51-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/memory/3932-57-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Intel iDisplay Hub = "C:\\Windows\\SysWOW64\\igfxbh32.exe" igfxbh32.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 04232afde988dbf882ed66355fd24b30.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 04232afde988dbf882ed66355fd24b30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbh32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxbh32.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ 04232afde988dbf882ed66355fd24b30.exe File opened for modification C:\Windows\SysWOW64\igfxbh32.exe 04232afde988dbf882ed66355fd24b30.exe File created C:\Windows\SysWOW64\igfxbh32.exe 04232afde988dbf882ed66355fd24b30.exe File opened for modification C:\Windows\SysWOW64\ igfxbh32.exe File opened for modification C:\Windows\SysWOW64\igfxbh32.exe igfxbh32.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3064 set thread context of 4156 3064 04232afde988dbf882ed66355fd24b30.exe 92 PID 4072 set thread context of 3932 4072 igfxbh32.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 04232afde988dbf882ed66355fd24b30.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4156 04232afde988dbf882ed66355fd24b30.exe 4156 04232afde988dbf882ed66355fd24b30.exe 4156 04232afde988dbf882ed66355fd24b30.exe 4156 04232afde988dbf882ed66355fd24b30.exe 3932 igfxbh32.exe 3932 igfxbh32.exe 3932 igfxbh32.exe 3932 igfxbh32.exe 3932 igfxbh32.exe 3932 igfxbh32.exe 3932 igfxbh32.exe 3932 igfxbh32.exe 3932 igfxbh32.exe 3932 igfxbh32.exe 3932 igfxbh32.exe 3932 igfxbh32.exe 3932 igfxbh32.exe 3932 igfxbh32.exe 3932 igfxbh32.exe 3932 igfxbh32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3064 wrote to memory of 4156 3064 04232afde988dbf882ed66355fd24b30.exe 92 PID 3064 wrote to memory of 4156 3064 04232afde988dbf882ed66355fd24b30.exe 92 PID 3064 wrote to memory of 4156 3064 04232afde988dbf882ed66355fd24b30.exe 92 PID 3064 wrote to memory of 4156 3064 04232afde988dbf882ed66355fd24b30.exe 92 PID 3064 wrote to memory of 4156 3064 04232afde988dbf882ed66355fd24b30.exe 92 PID 3064 wrote to memory of 4156 3064 04232afde988dbf882ed66355fd24b30.exe 92 PID 3064 wrote to memory of 4156 3064 04232afde988dbf882ed66355fd24b30.exe 92 PID 3064 wrote to memory of 4156 3064 04232afde988dbf882ed66355fd24b30.exe 92 PID 4156 wrote to memory of 4072 4156 04232afde988dbf882ed66355fd24b30.exe 99 PID 4156 wrote to memory of 4072 4156 04232afde988dbf882ed66355fd24b30.exe 99 PID 4156 wrote to memory of 4072 4156 04232afde988dbf882ed66355fd24b30.exe 99 PID 4072 wrote to memory of 3932 4072 igfxbh32.exe 101 PID 4072 wrote to memory of 3932 4072 igfxbh32.exe 101 PID 4072 wrote to memory of 3932 4072 igfxbh32.exe 101 PID 4072 wrote to memory of 3932 4072 igfxbh32.exe 101 PID 4072 wrote to memory of 3932 4072 igfxbh32.exe 101 PID 4072 wrote to memory of 3932 4072 igfxbh32.exe 101 PID 4072 wrote to memory of 3932 4072 igfxbh32.exe 101 PID 4072 wrote to memory of 3932 4072 igfxbh32.exe 101 PID 3932 wrote to memory of 3396 3932 igfxbh32.exe 39 PID 3932 wrote to memory of 3396 3932 igfxbh32.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\04232afde988dbf882ed66355fd24b30.exe"C:\Users\Admin\AppData\Local\Temp\04232afde988dbf882ed66355fd24b30.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\04232afde988dbf882ed66355fd24b30.exe"C:\Users\Admin\AppData\Local\Temp\04232afde988dbf882ed66355fd24b30.exe"3⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\igfxbh32.exe"C:\Windows\SysWOW64\igfxbh32.exe" C:\Users\Admin\AppData\Local\Temp\04232A~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\igfxbh32.exe"C:\Windows\SysWOW64\igfxbh32.exe" C:\Users\Admin\AppData\Local\Temp\04232A~1.EXE5⤵
- Modifies firewall policy service
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3932
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD504232afde988dbf882ed66355fd24b30
SHA1a17104dc77f2b6ffa3d431d2d4810e592a735287
SHA25621ba7b8f019fb3966b00a61aa3d8ee3f9aedbc7b7923d80a40e4adb4e922ca42
SHA512b385ed1ec7d8e6e156a75de93d5d8410f7a1b4c7259bff69b83786d850e09b78d29c9cab6ae0e70c673985e2849584f00d5e4dc887f59c093952be67a520dd41
-
Filesize
231KB
MD5a8b0f12e79f6ac4846515150f45d186a
SHA11dae58c2c969e791171631936d49c09f466a6455
SHA25644b791ba6240541fe9357dc6a55de2460e8ce31683feffd94747d7531e5ca3a7
SHA51247e2735998ca4b0c598a4126e69b1b98399d90d3e8fd45ad1c4fcedb74f03b8321c8c31648412f64321573a2ea5b83f0cb217869730846e96f5ebad2b5f3c6ae
-
Filesize
197KB
MD5feaf9da207fe5b9c331327ebaec7a5b6
SHA19c772ef280b2a427c5cfb9b04556f6fa20fa3aa0
SHA2562047e8f60c00f0a29fce7ce1d455531007b645da0628dcbc848e62698fc84841
SHA512f4f7c67401bc660685f1cbb411b3f622667e2b3c3946d840a60cbbde1ac045fa336be171c8f4c34d591fb14d29d6ebde708d589220ac45dc544327e19cb8a8cb