Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:22
Behavioral task
behavioral1
Sample
05828faa9ba3fcf70966a7a09f4ddc02.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05828faa9ba3fcf70966a7a09f4ddc02.exe
Resource
win10v2004-20231215-en
General
-
Target
05828faa9ba3fcf70966a7a09f4ddc02.exe
-
Size
500KB
-
MD5
05828faa9ba3fcf70966a7a09f4ddc02
-
SHA1
83771e01eafc5beee49f62833994f679b076f3c3
-
SHA256
2253005ca9fff67656bbf6740aef1ff7ecfd04ed53238ebcf4f6ea0f1d665a8f
-
SHA512
4a1ad275f2cea57a7ef7df345984f08526b9c2411a128caeb990afd330f22d97fcb4ff8086047217b8a137bc781f6d777db9cb9b044c32e3b428098063ed9b07
-
SSDEEP
12288:jbeYuefQI+2yR8PkGIHKJZOSwFykiQmlHSAca3zhSZkL/GDFnSoY:jluefQeyR8PkGIHKbOSwFliSRadekASo
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2740 cmd.exe -
resource yara_rule behavioral1/memory/2156-0-0x0000000000400000-0x000000000048F000-memory.dmp themida behavioral1/memory/2156-1-0x0000000000400000-0x000000000048F000-memory.dmp themida behavioral1/memory/2156-2-0x0000000000400000-0x000000000048F000-memory.dmp themida behavioral1/memory/2156-3-0x0000000000400000-0x000000000048F000-memory.dmp themida -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllcache\mlqm.exe 05828faa9ba3fcf70966a7a09f4ddc02.exe File opened for modification C:\Windows\SysWOW64\dllcache\mlqm.exe 05828faa9ba3fcf70966a7a09f4ddc02.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2740 2156 05828faa9ba3fcf70966a7a09f4ddc02.exe 28 PID 2156 wrote to memory of 2740 2156 05828faa9ba3fcf70966a7a09f4ddc02.exe 28 PID 2156 wrote to memory of 2740 2156 05828faa9ba3fcf70966a7a09f4ddc02.exe 28 PID 2156 wrote to memory of 2740 2156 05828faa9ba3fcf70966a7a09f4ddc02.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\05828faa9ba3fcf70966a7a09f4ddc02.exe"C:\Users\Admin\AppData\Local\Temp\05828faa9ba3fcf70966a7a09f4ddc02.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\05828F~1.EXE > NUL2⤵
- Deletes itself
PID:2740
-