Analysis
-
max time kernel
9s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 07:54
Static task
static1
Behavioral task
behavioral1
Sample
12b88e4bbe28e4bbb0b942e811859bca.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12b88e4bbe28e4bbb0b942e811859bca.exe
Resource
win10v2004-20231215-en
General
-
Target
12b88e4bbe28e4bbb0b942e811859bca.exe
-
Size
174KB
-
MD5
12b88e4bbe28e4bbb0b942e811859bca
-
SHA1
18806215c8b0bc2479c27b5a3f3aa0f37f89e3c0
-
SHA256
6072b423b7d503a38eb0856de7c2e60610e656f2b77efead939d34393b1bd535
-
SHA512
72cb976e0af4e72844c39c2872116b633fa7d4d0313bd887f3acbdbe080ff5e2ca6b86851c11a20cde3a4490899430c515a6d8e53c627a5939e5d581fbc3cbae
-
SSDEEP
3072:q6zKqIoKEm4d15hQxBgJJMESIUQB5HJkDhHLfHGcu1o/ihj:7mEm4nQ0csHJktjnu1o/y
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
resource yara_rule behavioral1/memory/1176-11-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1176-10-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1176-9-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1176-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1176-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1176-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1176-19-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2836-34-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2836-33-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2836-32-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2836-37-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2648-57-0x00000000031E0000-0x0000000003220000-memory.dmp upx behavioral1/memory/2648-56-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2904-74-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2016-93-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 12b88e4bbe28e4bbb0b942e811859bca.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 12b88e4bbe28e4bbb0b942e811859bca.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxwd32.exe 12b88e4bbe28e4bbb0b942e811859bca.exe File created C:\Windows\SysWOW64\igfxwd32.exe 12b88e4bbe28e4bbb0b942e811859bca.exe File opened for modification C:\Windows\SysWOW64\ 12b88e4bbe28e4bbb0b942e811859bca.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1428 set thread context of 1176 1428 12b88e4bbe28e4bbb0b942e811859bca.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1176 12b88e4bbe28e4bbb0b942e811859bca.exe 1176 12b88e4bbe28e4bbb0b942e811859bca.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1428 wrote to memory of 1176 1428 12b88e4bbe28e4bbb0b942e811859bca.exe 28 PID 1428 wrote to memory of 1176 1428 12b88e4bbe28e4bbb0b942e811859bca.exe 28 PID 1428 wrote to memory of 1176 1428 12b88e4bbe28e4bbb0b942e811859bca.exe 28 PID 1428 wrote to memory of 1176 1428 12b88e4bbe28e4bbb0b942e811859bca.exe 28 PID 1428 wrote to memory of 1176 1428 12b88e4bbe28e4bbb0b942e811859bca.exe 28 PID 1428 wrote to memory of 1176 1428 12b88e4bbe28e4bbb0b942e811859bca.exe 28 PID 1428 wrote to memory of 1176 1428 12b88e4bbe28e4bbb0b942e811859bca.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\12b88e4bbe28e4bbb0b942e811859bca.exe"C:\Users\Admin\AppData\Local\Temp\12b88e4bbe28e4bbb0b942e811859bca.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\12b88e4bbe28e4bbb0b942e811859bca.exe"C:\Users\Admin\AppData\Local\Temp\12b88e4bbe28e4bbb0b942e811859bca.exe"2⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1176 -
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Users\Admin\AppData\Local\Temp\12B88E~1.EXE3⤵PID:2744
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Users\Admin\AppData\Local\Temp\12B88E~1.EXE4⤵PID:2836
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe5⤵PID:2608
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe6⤵PID:2648
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe7⤵PID:288
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe8⤵PID:2904
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe9⤵PID:2180
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe10⤵PID:2016
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe11⤵PID:1648
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe12⤵PID:2556
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe13⤵PID:1056
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe14⤵PID:1836
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe15⤵PID:2440
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe16⤵PID:1548
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe17⤵PID:1780
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe18⤵PID:1976
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe19⤵PID:1804
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe20⤵PID:1720
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe21⤵PID:2348
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe22⤵PID:2812
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe23⤵PID:2764
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe24⤵PID:3052
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe25⤵PID:2372
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe26⤵PID:1892
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe27⤵PID:2324
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe28⤵PID:2700
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe29⤵PID:1588
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe30⤵PID:2288
-
C:\Windows\SysWOW64\igfxwd32.exe"C:\Windows\system32\igfxwd32.exe" C:\Windows\SysWOW64\igfxwd32.exe31⤵PID:2568
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-