Analysis

  • max time kernel
    122s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 09:04

General

  • Target

    4de76ee6580af4b0cf56a89c06747409.exe

  • Size

    203KB

  • MD5

    4de76ee6580af4b0cf56a89c06747409

  • SHA1

    3b05ce7f5e12ea8f7006e8eccc6ef2b8f64036c8

  • SHA256

    c3bc9e6f0941e4d4760202af0411b1a861956cb2f72e72e431cdf0fc479b9875

  • SHA512

    2c240bdabf9a8320ac2e9ed62fe75153bc1c47d2af7e6a331e0b2656be38009392b800c0066c1cd619f8f785e32fc26900e8eca33090f07d8fee663cfa95486d

  • SSDEEP

    3072:A59NPYs7BGbxKcLSJ4P6CowCkPOQLPlDS8PmbE2yprdHqLptOp0J2YcP8su9waMk:ADR1KKBSrowC25hD3PuEfv0ptOfYcgXH

Malware Config

Extracted

Family

metasploit

Version

encoder/fnstenv_mov

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Executes dropped EXE 18 IoCs
  • Drops file in System32 directory 18 IoCs
  • Suspicious use of SetThreadContext 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\SysWOW64\msq23.exe
    C:\Windows\SysWOW64\msq23.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3360
    • C:\Windows\SysWOW64\msq23.exe
      C:\Windows\system32\msq23.exe 1148 "C:\Windows\SysWOW64\msq23.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3196
  • C:\Windows\SysWOW64\msq23.exe
    C:\Windows\system32\msq23.exe 1112 "C:\Users\Admin\AppData\Local\Temp\4de76ee6580af4b0cf56a89c06747409.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3552
  • C:\Users\Admin\AppData\Local\Temp\4de76ee6580af4b0cf56a89c06747409.exe
    C:\Users\Admin\AppData\Local\Temp\4de76ee6580af4b0cf56a89c06747409.exe
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3444
  • C:\Users\Admin\AppData\Local\Temp\4de76ee6580af4b0cf56a89c06747409.exe
    "C:\Users\Admin\AppData\Local\Temp\4de76ee6580af4b0cf56a89c06747409.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3548
  • C:\Windows\SysWOW64\msq23.exe
    C:\Windows\SysWOW64\msq23.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Windows\SysWOW64\msq23.exe
      C:\Windows\system32\msq23.exe 1124 "C:\Windows\SysWOW64\msq23.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4192
  • C:\Windows\SysWOW64\msq23.exe
    C:\Windows\SysWOW64\msq23.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3544
    • C:\Windows\SysWOW64\msq23.exe
      C:\Windows\system32\msq23.exe 1100 "C:\Windows\SysWOW64\msq23.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:408
  • C:\Windows\SysWOW64\msq23.exe
    C:\Windows\SysWOW64\msq23.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\SysWOW64\msq23.exe
      C:\Windows\system32\msq23.exe 1112 "C:\Windows\SysWOW64\msq23.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Windows\SysWOW64\msq23.exe
        C:\Windows\SysWOW64\msq23.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:2880
        • C:\Windows\SysWOW64\msq23.exe
          C:\Windows\system32\msq23.exe 1124 "C:\Windows\SysWOW64\msq23.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1800
          • C:\Windows\SysWOW64\msq23.exe
            C:\Windows\SysWOW64\msq23.exe
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:876
            • C:\Windows\SysWOW64\msq23.exe
              C:\Windows\system32\msq23.exe 1124 "C:\Windows\SysWOW64\msq23.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3264
  • C:\Windows\SysWOW64\msq23.exe
    C:\Windows\SysWOW64\msq23.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Windows\SysWOW64\msq23.exe
      C:\Windows\system32\msq23.exe 1120 "C:\Windows\SysWOW64\msq23.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      PID:4012
  • C:\Windows\SysWOW64\msq23.exe
    C:\Windows\SysWOW64\msq23.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:2656
    • C:\Windows\SysWOW64\msq23.exe
      C:\Windows\system32\msq23.exe 1120 "C:\Windows\SysWOW64\msq23.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      PID:3224
  • C:\Windows\SysWOW64\msq23.exe
    C:\Windows\SysWOW64\msq23.exe
    1⤵
    • Executes dropped EXE
    PID:3044
    • C:\Windows\SysWOW64\msq23.exe
      C:\Windows\system32\msq23.exe 1124 "C:\Windows\SysWOW64\msq23.exe"
      2⤵
        PID:3996
    • C:\Windows\SysWOW64\msq23.exe
      C:\Windows\SysWOW64\msq23.exe
      1⤵
        PID:4584

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              74KB

              MD5

              5e88790bfcac6214edefeca074c9044f

              SHA1

              db4f47efaee173ac31e475560d329dd1411f9e3c

              SHA256

              153acd743d9262284b4e2a194b392736d50a4e8f179ad7373933a57d7ef73944

              SHA512

              c48138c8f312247d2e335d2ff9eb5f3a7b22bd0c1cf86b603a4bd75efc82d8d6b4af547fa707aedadf10dd1c018f862b2c24c619871ab9d72cb48d299dd8fa7a

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              153KB

              MD5

              49ede2f277ee600cc27027510cf7eaf0

              SHA1

              d9b5231f5e6017e6429cdfc41384d987e279af64

              SHA256

              4f48b7771c9d85207bf14d1d051a649ea6ebbcfb5ec28d4d7d238125ce2e5789

              SHA512

              5b338bec6f0e05df218b4727ca952a7e4e6d73d3b8bf36e05a71f764c00fceda0e1d021917be6ca21fc66e02988d10d5131c7007b12c649c110dfcc57f0451cd

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              98KB

              MD5

              daeb4213700b1eb93b8ecbf86f2f4add

              SHA1

              7e86707f7cea02536c51f0de483390ed1ad05fd1

              SHA256

              d8304ca4c143ae727f68d00a9a382c8610c1cde3584beefade478bee20d72274

              SHA512

              9cd12358416871c7434e1ed876aabddef936845c3e6461e0864b089c6b7025026f7180ac969e0e2aa57c287abe58d1a914b9ca90c9ec2b974682d019a1377298

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              203KB

              MD5

              4de76ee6580af4b0cf56a89c06747409

              SHA1

              3b05ce7f5e12ea8f7006e8eccc6ef2b8f64036c8

              SHA256

              c3bc9e6f0941e4d4760202af0411b1a861956cb2f72e72e431cdf0fc479b9875

              SHA512

              2c240bdabf9a8320ac2e9ed62fe75153bc1c47d2af7e6a331e0b2656be38009392b800c0066c1cd619f8f785e32fc26900e8eca33090f07d8fee663cfa95486d

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              172KB

              MD5

              e20fc6902d36cfe99cf718cf04f0a33d

              SHA1

              87786a179d9c9115dd799b00fd1e22918680d935

              SHA256

              1df50b680f5378b0c3105b1f34c54df8a57e71bacffaf182aaf744bb15a3f9d9

              SHA512

              87416d5f640c9fcf1651acaeb55c2f7bd51790cf83509c6dcd40c2054730c097f2cfa4abf7d743b8bd994745ea520a2bbfac2ff31755923ece2062031a73ce6a

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              101KB

              MD5

              c7ed5acc2aab89ef05f16df19d18e2c7

              SHA1

              99fc05ca3fa38f3e9d3d21344d599dfd208cdf2f

              SHA256

              7aadb3771f482dd7a2d972f38d49acdf5d3bdb8b081ac79f2c175a6dfb586673

              SHA512

              662c07bd88d00bf8919d5ac94b107ef021c232d20e5a061f3da29d7d409059403c8af61473be074c7edaf53fb80bc0905d19f7dc1974eea2e4fa6bd1c83802a6

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              95KB

              MD5

              935f7927a8c8511ef6847d0cc9b5fe7c

              SHA1

              30db43a7eff633afa0c6aca5f6fa94907e9f02a7

              SHA256

              6274d88b00614adcd4f623a3d390fa7847f5365626a3f41267cf54c8c9fc0dc7

              SHA512

              5f67c8e398f7fc24e5999dd8a4f40010c6cf2f2294bdc4c30472d9ee99ecf4e37597430a305778649cbca88a6b4e0d3182611e486992c289df5f8d8dbdd8055d

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              178KB

              MD5

              1738391b8c7fba7a1b940e49bfc9b3d7

              SHA1

              55ab29be62c36bac3ab5d3652b6247cc38979143

              SHA256

              c634d6a8d3dfa14fcf0cffa69859726897654b06f903f6360910be25dc325cec

              SHA512

              c3d7a8b8cb449b6d59a47d7b0aa1f5ef263c4a007ad935e32deec8b03f0ebe7dab7d69a2a3529cdc3988f9e028ccb8a233eff195804219bbd793697fb0671332

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              147KB

              MD5

              84c1cd2f019a10ac29670dc60ce3e394

              SHA1

              bdd2433f4d803f2345a15eb96e078245a81871ec

              SHA256

              a6bbf5a5bcd2fe0f72518ba31d1ef1298cbbb548c0a676fc3d161894f688f7b0

              SHA512

              5dd067905f20054c83ec8b81e0377cf22a5ca547fbd431f461a3c65c777ae33cd51ca02bd4fac12eb033cab243c8312dba162df99ae9b3afef460df01d4c7012

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              180KB

              MD5

              a4e69df03a84ca341c55edaab1499a69

              SHA1

              b0e3a85dcd821bfd1170dab1238047e43b4db772

              SHA256

              720f9fae9387bf7317f8139a99baa420d46f1cd274d2f855204f702263f4f188

              SHA512

              2ac7e0289cdace61a55c882dbb82d6efd6355206c8deedde45d29166a35e5b9b99a71b908a0481e7fb4adfc8de8f14c374eb86979aeca34ac3db4c899ede98c7

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              83KB

              MD5

              ec70ab9de5d348284d3fca2945df870f

              SHA1

              b4c298ebf96d5dee521725ba7ce8afff6984f170

              SHA256

              b710ec275f188d523a06a49b23460144be49e18aa0d167ccd66ad7628f54b18f

              SHA512

              f10891170d0cb1e6992c77feaf10620c4db2ea5acaadb10ae04facaf449f17b145073e388c83dec8f96b63cecc39c2cdff0ebf6fc85b96fd15cdc8a1e5804f31

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              179KB

              MD5

              a78eee55e3256abebc309ada5ab24a12

              SHA1

              13210c014c3eb6562cf67c7f84162ee3119cf7fe

              SHA256

              677b00ed68e2f841756e99dd99e7e96e6deaedb34f9dca7b7fd7a49342fb7bd5

              SHA512

              441dde8064719f10a5281e9f47f85b4b7a6ec9f6ea5156df110408cf1c46e1b565f39f6b7ee7b890f990dc227d84ed979f358fdd1aa05a364d4b670f0f3746fc

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              168KB

              MD5

              4df9b1e7fe9eb81184e5b6f99e6acdbe

              SHA1

              e13cf0e9e13aa79838311606de0ffeddd099dd91

              SHA256

              3d2612730f54c015e4858d571816878ad63fc7c3a703df7dca53a0bff7f01d34

              SHA512

              b2418bf5cc3c1cc046a52e1dc937d43dd8a3fbb79aebd385e99a5c410465f0d6af0403411727ac0a39012ada2d56f0158423c1610abd92800c90071cfd96722b

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              132KB

              MD5

              b2d9adafaae9ee8773319c54d574a841

              SHA1

              efa580951d12b94a1ec4399e87ddd3649731c52b

              SHA256

              80aa09b2136c60e4bd35275771433ab1968540e71e62b2c54655d4531bdf9fc8

              SHA512

              fa7e934f831e912a8e025edc376d35b18e2eaff6383c41e7da19f105101d032ffc18abfeffd7850627c7c2f80144d811c80795ffc1f514c48300a32efcf8ba35

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              42KB

              MD5

              a446cbcf32289204ba6666bf79864732

              SHA1

              0c554424357183686aee2a21e993d5c5aea8e688

              SHA256

              1b8561ae679834cc2cbf5ac79ebf6e50b9ce1d7ccbc8e5664cf8a374e191367b

              SHA512

              34c766ac565609f54d719f794b01edc08e303997366e21a5e5f515a934ad01ef8534b54e0b30defcc9452dbff866ff96f3bcc4a9879c2cc67a46295a2e9e5101

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              67KB

              MD5

              08580a445e19bd6a1fa0f9e95d9bbc4b

              SHA1

              0d7e87479e215c567ee2f8de1fa1c0e5c815402b

              SHA256

              cd0c9632587533f392aee90d2719887cec0e866b8de2ce4d7c9b2c7daf98ef80

              SHA512

              593ed476d687cc7ef8ad5a426c128693a79cc7ff31357f082e517592cc9cb253e636790880a6209964cbd06a54ab19481591511175cf309c46247e23fa3050fc

            • C:\Windows\SysWOW64\msq23.exe

              Filesize

              187KB

              MD5

              c1b4adfd5e0df100f82298910950b9b4

              SHA1

              1a5bc5637c66ebd47349cf23457cd9604e639825

              SHA256

              f1c6faa40df1598245c0d08560c1774e9ccd0a3fc1d75d18ca1efaa43e58972b

              SHA512

              c8341b485e1e64152081e7251fdfa045242aa1759fa7024a98ad45f668cfa8ec372a45b8478bd984fcb808127915de705ad86a9b1fc87abff179fc7ae28e01d7

            • memory/408-41-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/876-62-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/876-72-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/1392-71-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/1392-81-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/1620-55-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/1620-45-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/1800-59-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/2008-51-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/2008-48-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/2468-37-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/2468-28-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/2656-80-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/2656-90-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/2880-63-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/2880-54-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/3044-99-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/3044-89-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/3196-23-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/3224-84-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/3224-86-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/3264-69-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/3264-65-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/3360-27-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/3360-18-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/3444-5-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/3444-1-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/3444-4-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/3444-6-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/3444-19-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/3544-46-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/3544-36-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB

            • memory/3548-2-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/3548-0-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/3552-15-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/3996-95-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/3996-93-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/4012-77-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/4012-74-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/4192-32-0x0000000010000000-0x0000000010038000-memory.dmp

              Filesize

              224KB

            • memory/4584-98-0x0000000000400000-0x000000000050B000-memory.dmp

              Filesize

              1.0MB