Analysis
-
max time kernel
102s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2024 15:15
Static task
static1
Behavioral task
behavioral1
Sample
3e1484958d36378ab52a298fefd50d8e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e1484958d36378ab52a298fefd50d8e.exe
Resource
win10v2004-20231215-en
General
-
Target
3e1484958d36378ab52a298fefd50d8e.exe
-
Size
80KB
-
MD5
3e1484958d36378ab52a298fefd50d8e
-
SHA1
d054086c5879bc90b2ae6a3c9978c8e2aeb29c0b
-
SHA256
b479843e834146fbfca5b1233c5cf3c1fddaec5f1241f75a9809c767a934069d
-
SHA512
9b49cddf30d8b269e9f6efb69a6aa4dfb8e961ce14d862c4ec2472c205816c8e5f8c2b12f20ca248d181da61d2e00db8db7578004c911d89a03536f7c37fbbb5
-
SSDEEP
1536:2qzC6Ici4KbmRjWTtXWVhtB66TUkmGYQT3XyluPy6egwLcHJ1p:2z39XUitXehtB6lkm8TZPyEv5
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\aadrive32.exe" 3e1484958d36378ab52a298fefd50d8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3e1484958d36378ab52a298fefd50d8e.exe -
Executes dropped EXE 2 IoCs
pid Process 3732 aadrive32.exe 4876 aadrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\aadrive32.exe" 3e1484958d36378ab52a298fefd50d8e.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4424 set thread context of 5068 4424 3e1484958d36378ab52a298fefd50d8e.exe 19 PID 3732 set thread context of 4876 3732 aadrive32.exe 17 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\%windir%\lfffile32.log aadrive32.exe File created C:\Windows\aadrive32.exe 3e1484958d36378ab52a298fefd50d8e.exe File opened for modification C:\Windows\aadrive32.exe 3e1484958d36378ab52a298fefd50d8e.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5068 3e1484958d36378ab52a298fefd50d8e.exe 5068 3e1484958d36378ab52a298fefd50d8e.exe 5068 3e1484958d36378ab52a298fefd50d8e.exe 5068 3e1484958d36378ab52a298fefd50d8e.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4424 wrote to memory of 5068 4424 3e1484958d36378ab52a298fefd50d8e.exe 19 PID 4424 wrote to memory of 5068 4424 3e1484958d36378ab52a298fefd50d8e.exe 19 PID 4424 wrote to memory of 5068 4424 3e1484958d36378ab52a298fefd50d8e.exe 19 PID 4424 wrote to memory of 5068 4424 3e1484958d36378ab52a298fefd50d8e.exe 19 PID 4424 wrote to memory of 5068 4424 3e1484958d36378ab52a298fefd50d8e.exe 19 PID 4424 wrote to memory of 5068 4424 3e1484958d36378ab52a298fefd50d8e.exe 19 PID 4424 wrote to memory of 5068 4424 3e1484958d36378ab52a298fefd50d8e.exe 19 PID 5068 wrote to memory of 3732 5068 3e1484958d36378ab52a298fefd50d8e.exe 18 PID 5068 wrote to memory of 3732 5068 3e1484958d36378ab52a298fefd50d8e.exe 18 PID 5068 wrote to memory of 3732 5068 3e1484958d36378ab52a298fefd50d8e.exe 18 PID 3732 wrote to memory of 4876 3732 aadrive32.exe 17 PID 3732 wrote to memory of 4876 3732 aadrive32.exe 17 PID 3732 wrote to memory of 4876 3732 aadrive32.exe 17 PID 3732 wrote to memory of 4876 3732 aadrive32.exe 17 PID 3732 wrote to memory of 4876 3732 aadrive32.exe 17 PID 3732 wrote to memory of 4876 3732 aadrive32.exe 17 PID 3732 wrote to memory of 4876 3732 aadrive32.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e1484958d36378ab52a298fefd50d8e.exe"C:\Users\Admin\AppData\Local\Temp\3e1484958d36378ab52a298fefd50d8e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\3e1484958d36378ab52a298fefd50d8e.exeC:\Users\Admin\AppData\Local\Temp\3e1484958d36378ab52a298fefd50d8e.exe2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5068
-
-
C:\Windows\aadrive32.exeC:\Windows\aadrive32.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4876
-
C:\Windows\aadrive32.exe"C:\Windows\aadrive32.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3732