Analysis
-
max time kernel
132s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 12:21
Static task
static1
Behavioral task
behavioral1
Sample
1df2404b219f379389a6297cfb1d53fa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1df2404b219f379389a6297cfb1d53fa.exe
Resource
win10v2004-20231215-en
General
-
Target
1df2404b219f379389a6297cfb1d53fa.exe
-
Size
149KB
-
MD5
1df2404b219f379389a6297cfb1d53fa
-
SHA1
d7847a487795efd429428012a935c447e75b4040
-
SHA256
30cb4b61563bd49db7d74d18c532ed48409cebf9d8c827b24363537c14cdd124
-
SHA512
3bb8f84885777f04a1081614f0f9dfced8b97389406b908abf581b062b588872ab012fdddbb7d41e2ce690f91ee3f6d713f4047af56f35d3d7584f4619cd6dfd
-
SSDEEP
3072:eliUPXC8k1nJrX+fNTBf7iAT2Rc2Y7zBTLwYQbOSD12VgF:ezBkLL2NTBTiYCc2YfBISSD12V
Malware Config
Extracted
metasploit
windows/reverse_winhttp
https://103.129.196.29:23351/uhxeugBw/4pV-7FpcH2Huc-9yjo632Q2HkuwXDsb3zHxqqkPeP003czr_e
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2132 wrote to memory of 1352 2132 1df2404b219f379389a6297cfb1d53fa.exe 28 PID 2132 wrote to memory of 1352 2132 1df2404b219f379389a6297cfb1d53fa.exe 28 PID 2132 wrote to memory of 1352 2132 1df2404b219f379389a6297cfb1d53fa.exe 28 PID 2132 wrote to memory of 1352 2132 1df2404b219f379389a6297cfb1d53fa.exe 28 PID 1352 wrote to memory of 1148 1352 cmd.exe 30 PID 1352 wrote to memory of 1148 1352 cmd.exe 30 PID 1352 wrote to memory of 1148 1352 cmd.exe 30 PID 1352 wrote to memory of 2552 1352 cmd.exe 31 PID 1352 wrote to memory of 2552 1352 cmd.exe 31 PID 1352 wrote to memory of 2552 1352 cmd.exe 31 PID 2552 wrote to memory of 2096 2552 WScript.exe 32 PID 2552 wrote to memory of 2096 2552 WScript.exe 32 PID 2552 wrote to memory of 2096 2552 WScript.exe 32 PID 2552 wrote to memory of 2096 2552 WScript.exe 32 PID 2552 wrote to memory of 2096 2552 WScript.exe 32 PID 2552 wrote to memory of 2096 2552 WScript.exe 32 PID 2552 wrote to memory of 2096 2552 WScript.exe 32 PID 2552 wrote to memory of 2096 2552 WScript.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1df2404b219f379389a6297cfb1d53fa.exe"C:\Users\Admin\AppData\Local\Temp\1df2404b219f379389a6297cfb1d53fa.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\843D.tmp\843E.tmp\843F.bat C:\Users\Admin\AppData\Local\Temp\1df2404b219f379389a6297cfb1d53fa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\system32\certutil.execertutil -decode x "C:\Users\Admin\AppData\Roaming\x.js"3⤵PID:1148
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\x.js"3⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe"4⤵PID:2096
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5dff8827e630bfb9ce9f0066fcb971cca
SHA1df6185a4e9f54e218b98d17d4e119474f4ec69b6
SHA25674b33f1a8cb4de2e3d02c7b4ac1cccfe19a1b305607a5f36fdd6220b2c3354e3
SHA51234e3e1123293d1b95ac5bbac43556cb2b1960cda0f64abe551a6dab761ad8ac2803f3627513dc85493f91fed1c022c7f1ea0afc4db7a7d5625cc03bcf8307272
-
Filesize
4KB
MD53911e4e682837edd8b2a465b3889c891
SHA1b2fb777a38820f2af22438524b7f312b3d007ee1
SHA25616fe6bb7539eab2df2644bdaf686a1da8a1ced3dc42cae10060b17de0d84dbfe
SHA5122d85d72bd903e4ed4da981eed1b816a15b32f5d4f1043fede5959da78e4197354e01c3cac9df42e92e349d695a0a646d582ffac383f7249777b8f106958d7d80
-
Filesize
53KB
MD5e943c11fb5cac8cdae665d8930c79c44
SHA10bdb943d195ccce358d3221fb61b6ddeef6452f0
SHA2562fcd1200bc020ceb36d2b8a08148e2c168ee99e23b0fa1a1ea23583803d91efb
SHA512dd38742acfd6b87410d484ea9405a57dc64813f4889cafcbce144982689ed6dad1392368386f2d0c94e2902cf112175c07b1e87f12955a8bafe9d793c9939ea0
-
Filesize
38KB
MD54542c1a33fce34b2f5df7f293430ea9c
SHA1c7a66538ed158d236e869a8c3082228c1a85b23e
SHA2563e4b33f7d2f3646016dfdd4f820811036e8c91a7b9918dcaf3dd37a092f6a6fa
SHA5127d5aa4d102b8bad759d7c1078f90bf531b93b40e7ccae870a19cdf492548c1a135b35aaefff18cb24586590c0bc1f4f5d200f393cff47d90267a4b76485b5c59