Analysis
-
max time kernel
0s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
28e751fdd703634231c0a25d7081ffe2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28e751fdd703634231c0a25d7081ffe2.exe
Resource
win10v2004-20231215-en
General
-
Target
28e751fdd703634231c0a25d7081ffe2.exe
-
Size
145KB
-
MD5
28e751fdd703634231c0a25d7081ffe2
-
SHA1
cd660ea569bf6b2f55bbbe1352969e51878491a5
-
SHA256
8b54df8133dbef3dbaf42fb3ee9267fd521228776f16d9500eb12b9cadf678fd
-
SHA512
68271210a22a525a66de759d6ab0de345b5f84fe82fcc862b57661282ace81fc22623340b7b3fd9db4d2d005e2e2370d0d4fa9acb3867ef4d53f2d7c73904ccd
-
SSDEEP
3072:7mXTLdvPFfj1Ky33bbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVU7/0yoC4h:7qJnwvP6bQ7yMP+DE827/xovh
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 28e751fdd703634231c0a25d7081ffe2.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllcache\newhost.exe 28e751fdd703634231c0a25d7081ffe2.exe File opened for modification C:\Windows\SysWOW64\dllcache\newhost.exe 28e751fdd703634231c0a25d7081ffe2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 28e751fdd703634231c0a25d7081ffe2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 28e751fdd703634231c0a25d7081ffe2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 28e751fdd703634231c0a25d7081ffe2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1496 wrote to memory of 320 1496 28e751fdd703634231c0a25d7081ffe2.exe 17 PID 1496 wrote to memory of 320 1496 28e751fdd703634231c0a25d7081ffe2.exe 17 PID 1496 wrote to memory of 320 1496 28e751fdd703634231c0a25d7081ffe2.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\28e751fdd703634231c0a25d7081ffe2.exe"C:\Users\Admin\AppData\Local\Temp\28e751fdd703634231c0a25d7081ffe2.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\28E751~1.EXE >> NUL2⤵PID:320
-