Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 09:04
Static task
static1
Behavioral task
behavioral1
Sample
4de76ee6580af4b0cf56a89c06747409.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4de76ee6580af4b0cf56a89c06747409.exe
Resource
win10v2004-20231215-en
General
-
Target
4de76ee6580af4b0cf56a89c06747409.exe
-
Size
203KB
-
MD5
4de76ee6580af4b0cf56a89c06747409
-
SHA1
3b05ce7f5e12ea8f7006e8eccc6ef2b8f64036c8
-
SHA256
c3bc9e6f0941e4d4760202af0411b1a861956cb2f72e72e431cdf0fc479b9875
-
SHA512
2c240bdabf9a8320ac2e9ed62fe75153bc1c47d2af7e6a331e0b2656be38009392b800c0066c1cd619f8f785e32fc26900e8eca33090f07d8fee663cfa95486d
-
SSDEEP
3072:A59NPYs7BGbxKcLSJ4P6CowCkPOQLPlDS8PmbE2yprdHqLptOp0J2YcP8su9waMk:ADR1KKBSrowC25hD3PuEfv0ptOfYcgXH
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 20 IoCs
pid Process 2784 msq23.exe 2668 msq23.exe 2612 msq23.exe 2568 msq23.exe 1324 msq23.exe 1704 msq23.exe 2016 msq23.exe 1792 msq23.exe 1188 msq23.exe 1092 msq23.exe 2312 msq23.exe 2348 msq23.exe 1236 msq23.exe 1156 msq23.exe 1872 msq23.exe 3064 msq23.exe 1168 msq23.exe 1364 msq23.exe 2448 msq23.exe 1576 msq23.exe -
Loads dropped DLL 21 IoCs
pid Process 2880 4de76ee6580af4b0cf56a89c06747409.exe 2880 4de76ee6580af4b0cf56a89c06747409.exe 2784 msq23.exe 2668 msq23.exe 2668 msq23.exe 2568 msq23.exe 2568 msq23.exe 1704 msq23.exe 1704 msq23.exe 1792 msq23.exe 1792 msq23.exe 1092 msq23.exe 1092 msq23.exe 2348 msq23.exe 2348 msq23.exe 1156 msq23.exe 1156 msq23.exe 3064 msq23.exe 3064 msq23.exe 1364 msq23.exe 1364 msq23.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msq23.exe 4de76ee6580af4b0cf56a89c06747409.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe 4de76ee6580af4b0cf56a89c06747409.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2184 set thread context of 2880 2184 4de76ee6580af4b0cf56a89c06747409.exe 28 PID 2784 set thread context of 2668 2784 msq23.exe 30 PID 2612 set thread context of 2568 2612 msq23.exe 32 PID 1324 set thread context of 1704 1324 msq23.exe 36 PID 2016 set thread context of 1792 2016 msq23.exe 38 PID 1188 set thread context of 1092 1188 msq23.exe 40 PID 2312 set thread context of 2348 2312 msq23.exe 42 PID 1236 set thread context of 1156 1236 msq23.exe 44 PID 1872 set thread context of 3064 1872 msq23.exe 46 PID 1168 set thread context of 1364 1168 msq23.exe 48 PID 2448 set thread context of 1576 2448 msq23.exe 50 -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2184 4de76ee6580af4b0cf56a89c06747409.exe 2784 msq23.exe 2612 msq23.exe 1324 msq23.exe 2016 msq23.exe 1188 msq23.exe 2312 msq23.exe 1236 msq23.exe 1872 msq23.exe 1168 msq23.exe 2448 msq23.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2880 2184 4de76ee6580af4b0cf56a89c06747409.exe 28 PID 2184 wrote to memory of 2880 2184 4de76ee6580af4b0cf56a89c06747409.exe 28 PID 2184 wrote to memory of 2880 2184 4de76ee6580af4b0cf56a89c06747409.exe 28 PID 2184 wrote to memory of 2880 2184 4de76ee6580af4b0cf56a89c06747409.exe 28 PID 2184 wrote to memory of 2880 2184 4de76ee6580af4b0cf56a89c06747409.exe 28 PID 2184 wrote to memory of 2880 2184 4de76ee6580af4b0cf56a89c06747409.exe 28 PID 2880 wrote to memory of 2784 2880 4de76ee6580af4b0cf56a89c06747409.exe 29 PID 2880 wrote to memory of 2784 2880 4de76ee6580af4b0cf56a89c06747409.exe 29 PID 2880 wrote to memory of 2784 2880 4de76ee6580af4b0cf56a89c06747409.exe 29 PID 2880 wrote to memory of 2784 2880 4de76ee6580af4b0cf56a89c06747409.exe 29 PID 2784 wrote to memory of 2668 2784 msq23.exe 30 PID 2784 wrote to memory of 2668 2784 msq23.exe 30 PID 2784 wrote to memory of 2668 2784 msq23.exe 30 PID 2784 wrote to memory of 2668 2784 msq23.exe 30 PID 2784 wrote to memory of 2668 2784 msq23.exe 30 PID 2784 wrote to memory of 2668 2784 msq23.exe 30 PID 2668 wrote to memory of 2612 2668 msq23.exe 31 PID 2668 wrote to memory of 2612 2668 msq23.exe 31 PID 2668 wrote to memory of 2612 2668 msq23.exe 31 PID 2668 wrote to memory of 2612 2668 msq23.exe 31 PID 2612 wrote to memory of 2568 2612 msq23.exe 32 PID 2612 wrote to memory of 2568 2612 msq23.exe 32 PID 2612 wrote to memory of 2568 2612 msq23.exe 32 PID 2612 wrote to memory of 2568 2612 msq23.exe 32 PID 2612 wrote to memory of 2568 2612 msq23.exe 32 PID 2612 wrote to memory of 2568 2612 msq23.exe 32 PID 2568 wrote to memory of 1324 2568 msq23.exe 35 PID 2568 wrote to memory of 1324 2568 msq23.exe 35 PID 2568 wrote to memory of 1324 2568 msq23.exe 35 PID 2568 wrote to memory of 1324 2568 msq23.exe 35 PID 1324 wrote to memory of 1704 1324 msq23.exe 36 PID 1324 wrote to memory of 1704 1324 msq23.exe 36 PID 1324 wrote to memory of 1704 1324 msq23.exe 36 PID 1324 wrote to memory of 1704 1324 msq23.exe 36 PID 1324 wrote to memory of 1704 1324 msq23.exe 36 PID 1324 wrote to memory of 1704 1324 msq23.exe 36 PID 1704 wrote to memory of 2016 1704 msq23.exe 37 PID 1704 wrote to memory of 2016 1704 msq23.exe 37 PID 1704 wrote to memory of 2016 1704 msq23.exe 37 PID 1704 wrote to memory of 2016 1704 msq23.exe 37 PID 2016 wrote to memory of 1792 2016 msq23.exe 38 PID 2016 wrote to memory of 1792 2016 msq23.exe 38 PID 2016 wrote to memory of 1792 2016 msq23.exe 38 PID 2016 wrote to memory of 1792 2016 msq23.exe 38 PID 2016 wrote to memory of 1792 2016 msq23.exe 38 PID 2016 wrote to memory of 1792 2016 msq23.exe 38 PID 1792 wrote to memory of 1188 1792 msq23.exe 39 PID 1792 wrote to memory of 1188 1792 msq23.exe 39 PID 1792 wrote to memory of 1188 1792 msq23.exe 39 PID 1792 wrote to memory of 1188 1792 msq23.exe 39 PID 1188 wrote to memory of 1092 1188 msq23.exe 40 PID 1188 wrote to memory of 1092 1188 msq23.exe 40 PID 1188 wrote to memory of 1092 1188 msq23.exe 40 PID 1188 wrote to memory of 1092 1188 msq23.exe 40 PID 1188 wrote to memory of 1092 1188 msq23.exe 40 PID 1188 wrote to memory of 1092 1188 msq23.exe 40 PID 1092 wrote to memory of 2312 1092 msq23.exe 41 PID 1092 wrote to memory of 2312 1092 msq23.exe 41 PID 1092 wrote to memory of 2312 1092 msq23.exe 41 PID 1092 wrote to memory of 2312 1092 msq23.exe 41 PID 2312 wrote to memory of 2348 2312 msq23.exe 42 PID 2312 wrote to memory of 2348 2312 msq23.exe 42 PID 2312 wrote to memory of 2348 2312 msq23.exe 42 PID 2312 wrote to memory of 2348 2312 msq23.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\4de76ee6580af4b0cf56a89c06747409.exe"C:\Users\Admin\AppData\Local\Temp\4de76ee6580af4b0cf56a89c06747409.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\4de76ee6580af4b0cf56a89c06747409.exeC:\Users\Admin\AppData\Local\Temp\4de76ee6580af4b0cf56a89c06747409.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 496 "C:\Users\Admin\AppData\Local\Temp\4de76ee6580af4b0cf56a89c06747409.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 524 "C:\Windows\SysWOW64\msq23.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 524 "C:\Windows\SysWOW64\msq23.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 524 "C:\Windows\SysWOW64\msq23.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 524 "C:\Windows\SysWOW64\msq23.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 524 "C:\Windows\SysWOW64\msq23.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2348 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 528 "C:\Windows\SysWOW64\msq23.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1236 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1156 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 524 "C:\Windows\SysWOW64\msq23.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1872 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3064 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 524 "C:\Windows\SysWOW64\msq23.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1168 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1364 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 524 "C:\Windows\SysWOW64\msq23.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2448 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1576
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203KB
MD54de76ee6580af4b0cf56a89c06747409
SHA13b05ce7f5e12ea8f7006e8eccc6ef2b8f64036c8
SHA256c3bc9e6f0941e4d4760202af0411b1a861956cb2f72e72e431cdf0fc479b9875
SHA5122c240bdabf9a8320ac2e9ed62fe75153bc1c47d2af7e6a331e0b2656be38009392b800c0066c1cd619f8f785e32fc26900e8eca33090f07d8fee663cfa95486d