Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:51
Static task
static1
Behavioral task
behavioral1
Sample
28e751fdd703634231c0a25d7081ffe2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28e751fdd703634231c0a25d7081ffe2.exe
Resource
win10v2004-20231215-en
General
-
Target
28e751fdd703634231c0a25d7081ffe2.exe
-
Size
145KB
-
MD5
28e751fdd703634231c0a25d7081ffe2
-
SHA1
cd660ea569bf6b2f55bbbe1352969e51878491a5
-
SHA256
8b54df8133dbef3dbaf42fb3ee9267fd521228776f16d9500eb12b9cadf678fd
-
SHA512
68271210a22a525a66de759d6ab0de345b5f84fe82fcc862b57661282ace81fc22623340b7b3fd9db4d2d005e2e2370d0d4fa9acb3867ef4d53f2d7c73904ccd
-
SSDEEP
3072:7mXTLdvPFfj1Ky33bbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVU7/0yoC4h:7qJnwvP6bQ7yMP+DE827/xovh
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2576 cmd.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 28e751fdd703634231c0a25d7081ffe2.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dllcache\newhost.exe 28e751fdd703634231c0a25d7081ffe2.exe File created C:\Windows\SysWOW64\dllcache\newhost.exe 28e751fdd703634231c0a25d7081ffe2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 28e751fdd703634231c0a25d7081ffe2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 28e751fdd703634231c0a25d7081ffe2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 28e751fdd703634231c0a25d7081ffe2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2576 2220 28e751fdd703634231c0a25d7081ffe2.exe 28 PID 2220 wrote to memory of 2576 2220 28e751fdd703634231c0a25d7081ffe2.exe 28 PID 2220 wrote to memory of 2576 2220 28e751fdd703634231c0a25d7081ffe2.exe 28 PID 2220 wrote to memory of 2576 2220 28e751fdd703634231c0a25d7081ffe2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\28e751fdd703634231c0a25d7081ffe2.exe"C:\Users\Admin\AppData\Local\Temp\28e751fdd703634231c0a25d7081ffe2.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\28E751~1.EXE >> NUL2⤵
- Deletes itself
PID:2576
-