Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
4772c058861a05be7a7fd654931e3c25.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4772c058861a05be7a7fd654931e3c25.exe
Resource
win10v2004-20231222-en
General
-
Target
4772c058861a05be7a7fd654931e3c25.exe
-
Size
374KB
-
MD5
4772c058861a05be7a7fd654931e3c25
-
SHA1
edf463fe1512dc7509203f519a4afcfb475088db
-
SHA256
82ecbaa97f176fc0115ac32d7a7c4cfee4585bc84eb21cd6848a0d01248b2779
-
SHA512
79179f20d97eb2ba40c3806cf93ad5d70ffcbb18209b4ec21a8d374abf627244c54ef73f0814b605dfd8bb02061645a2d8853df1915bc7c2b2a5672723c7da40
-
SSDEEP
6144:lDWHN0BEEbZX0Jz8RPR1iL/CW3e0dZfFgCZTdsmnElxEI8y8t7mJHbQ6rpMzgZYK:ciZX0JzSPRa1dTdxGmnOxH8TlaQww8tp
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 10 IoCs
pid Process 1256 wuauclt11.exe 796 wuauclt11.exe 2352 wuauclt11.exe 2120 wuauclt11.exe 1860 wuauclt11.exe 1036 wuauclt11.exe 1856 wuauclt11.exe 2756 wuauclt11.exe 2240 wuauclt11.exe 1404 wuauclt11.exe -
Loads dropped DLL 20 IoCs
pid Process 2848 4772c058861a05be7a7fd654931e3c25.exe 2848 4772c058861a05be7a7fd654931e3c25.exe 1256 wuauclt11.exe 1256 wuauclt11.exe 796 wuauclt11.exe 796 wuauclt11.exe 2352 wuauclt11.exe 2352 wuauclt11.exe 2120 wuauclt11.exe 2120 wuauclt11.exe 1860 wuauclt11.exe 1860 wuauclt11.exe 1036 wuauclt11.exe 1036 wuauclt11.exe 1856 wuauclt11.exe 1856 wuauclt11.exe 2756 wuauclt11.exe 2756 wuauclt11.exe 2240 wuauclt11.exe 2240 wuauclt11.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe 4772c058861a05be7a7fd654931e3c25.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe 4772c058861a05be7a7fd654931e3c25.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File created C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe File opened for modification C:\Windows\SysWOW64\wuauclt11.exe wuauclt11.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2848 wrote to memory of 1256 2848 4772c058861a05be7a7fd654931e3c25.exe 28 PID 2848 wrote to memory of 1256 2848 4772c058861a05be7a7fd654931e3c25.exe 28 PID 2848 wrote to memory of 1256 2848 4772c058861a05be7a7fd654931e3c25.exe 28 PID 2848 wrote to memory of 1256 2848 4772c058861a05be7a7fd654931e3c25.exe 28 PID 1256 wrote to memory of 796 1256 wuauclt11.exe 29 PID 1256 wrote to memory of 796 1256 wuauclt11.exe 29 PID 1256 wrote to memory of 796 1256 wuauclt11.exe 29 PID 1256 wrote to memory of 796 1256 wuauclt11.exe 29 PID 796 wrote to memory of 2352 796 wuauclt11.exe 30 PID 796 wrote to memory of 2352 796 wuauclt11.exe 30 PID 796 wrote to memory of 2352 796 wuauclt11.exe 30 PID 796 wrote to memory of 2352 796 wuauclt11.exe 30 PID 2352 wrote to memory of 2120 2352 wuauclt11.exe 33 PID 2352 wrote to memory of 2120 2352 wuauclt11.exe 33 PID 2352 wrote to memory of 2120 2352 wuauclt11.exe 33 PID 2352 wrote to memory of 2120 2352 wuauclt11.exe 33 PID 2120 wrote to memory of 1860 2120 wuauclt11.exe 34 PID 2120 wrote to memory of 1860 2120 wuauclt11.exe 34 PID 2120 wrote to memory of 1860 2120 wuauclt11.exe 34 PID 2120 wrote to memory of 1860 2120 wuauclt11.exe 34 PID 1860 wrote to memory of 1036 1860 wuauclt11.exe 35 PID 1860 wrote to memory of 1036 1860 wuauclt11.exe 35 PID 1860 wrote to memory of 1036 1860 wuauclt11.exe 35 PID 1860 wrote to memory of 1036 1860 wuauclt11.exe 35 PID 1036 wrote to memory of 1856 1036 wuauclt11.exe 36 PID 1036 wrote to memory of 1856 1036 wuauclt11.exe 36 PID 1036 wrote to memory of 1856 1036 wuauclt11.exe 36 PID 1036 wrote to memory of 1856 1036 wuauclt11.exe 36 PID 1856 wrote to memory of 2756 1856 wuauclt11.exe 37 PID 1856 wrote to memory of 2756 1856 wuauclt11.exe 37 PID 1856 wrote to memory of 2756 1856 wuauclt11.exe 37 PID 1856 wrote to memory of 2756 1856 wuauclt11.exe 37 PID 2756 wrote to memory of 2240 2756 wuauclt11.exe 38 PID 2756 wrote to memory of 2240 2756 wuauclt11.exe 38 PID 2756 wrote to memory of 2240 2756 wuauclt11.exe 38 PID 2756 wrote to memory of 2240 2756 wuauclt11.exe 38 PID 2240 wrote to memory of 1404 2240 wuauclt11.exe 39 PID 2240 wrote to memory of 1404 2240 wuauclt11.exe 39 PID 2240 wrote to memory of 1404 2240 wuauclt11.exe 39 PID 2240 wrote to memory of 1404 2240 wuauclt11.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\4772c058861a05be7a7fd654931e3c25.exe"C:\Users\Admin\AppData\Local\Temp\4772c058861a05be7a7fd654931e3c25.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 500 "C:\Users\Admin\AppData\Local\Temp\4772c058861a05be7a7fd654931e3c25.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 524 "C:\Windows\SysWOW64\wuauclt11.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 528 "C:\Windows\SysWOW64\wuauclt11.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 532 "C:\Windows\SysWOW64\wuauclt11.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 536 "C:\Windows\SysWOW64\wuauclt11.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 540 "C:\Windows\SysWOW64\wuauclt11.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 544 "C:\Windows\SysWOW64\wuauclt11.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 548 "C:\Windows\SysWOW64\wuauclt11.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 552 "C:\Windows\SysWOW64\wuauclt11.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\wuauclt11.exeC:\Windows\system32\wuauclt11.exe 556 "C:\Windows\SysWOW64\wuauclt11.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1404
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374KB
MD54772c058861a05be7a7fd654931e3c25
SHA1edf463fe1512dc7509203f519a4afcfb475088db
SHA25682ecbaa97f176fc0115ac32d7a7c4cfee4585bc84eb21cd6848a0d01248b2779
SHA51279179f20d97eb2ba40c3806cf93ad5d70ffcbb18209b4ec21a8d374abf627244c54ef73f0814b605dfd8bb02061645a2d8853df1915bc7c2b2a5672723c7da40