Analysis
-
max time kernel
122s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
4de76ee6580af4b0cf56a89c06747409.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4de76ee6580af4b0cf56a89c06747409.exe
Resource
win10v2004-20231215-en
General
-
Target
4de76ee6580af4b0cf56a89c06747409.exe
-
Size
203KB
-
MD5
4de76ee6580af4b0cf56a89c06747409
-
SHA1
3b05ce7f5e12ea8f7006e8eccc6ef2b8f64036c8
-
SHA256
c3bc9e6f0941e4d4760202af0411b1a861956cb2f72e72e431cdf0fc479b9875
-
SHA512
2c240bdabf9a8320ac2e9ed62fe75153bc1c47d2af7e6a331e0b2656be38009392b800c0066c1cd619f8f785e32fc26900e8eca33090f07d8fee663cfa95486d
-
SSDEEP
3072:A59NPYs7BGbxKcLSJ4P6CowCkPOQLPlDS8PmbE2yprdHqLptOp0J2YcP8su9waMk:ADR1KKBSrowC25hD3PuEfv0ptOfYcgXH
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 18 IoCs
pid Process 3552 msq23.exe 3360 msq23.exe 3196 msq23.exe 2468 msq23.exe 4192 msq23.exe 3544 msq23.exe 408 msq23.exe 1620 msq23.exe 2008 msq23.exe 2880 msq23.exe 1800 msq23.exe 876 msq23.exe 3264 msq23.exe 1392 msq23.exe 4012 msq23.exe 2656 msq23.exe 3224 msq23.exe 3044 msq23.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe 4de76ee6580af4b0cf56a89c06747409.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe 4de76ee6580af4b0cf56a89c06747409.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 3548 set thread context of 3444 3548 4de76ee6580af4b0cf56a89c06747409.exe 23 PID 3552 set thread context of 3360 3552 msq23.exe 21 PID 3196 set thread context of 2468 3196 msq23.exe 103 PID 4192 set thread context of 3544 4192 msq23.exe 107 PID 408 set thread context of 1620 408 msq23.exe 110 PID 2008 set thread context of 2880 2008 msq23.exe 113 PID 1800 set thread context of 876 1800 msq23.exe 116 PID 3264 set thread context of 1392 3264 msq23.exe 117 PID 4012 set thread context of 2656 4012 msq23.exe 127 PID 3224 set thread context of 3044 3224 msq23.exe 129 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3548 4de76ee6580af4b0cf56a89c06747409.exe 3548 4de76ee6580af4b0cf56a89c06747409.exe 3552 msq23.exe 3552 msq23.exe 3196 msq23.exe 3196 msq23.exe 4192 msq23.exe 4192 msq23.exe 408 msq23.exe 408 msq23.exe 2008 msq23.exe 2008 msq23.exe 1800 msq23.exe 1800 msq23.exe 3264 msq23.exe 3264 msq23.exe 4012 msq23.exe 4012 msq23.exe 3224 msq23.exe 3224 msq23.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3548 wrote to memory of 3444 3548 4de76ee6580af4b0cf56a89c06747409.exe 23 PID 3548 wrote to memory of 3444 3548 4de76ee6580af4b0cf56a89c06747409.exe 23 PID 3548 wrote to memory of 3444 3548 4de76ee6580af4b0cf56a89c06747409.exe 23 PID 3548 wrote to memory of 3444 3548 4de76ee6580af4b0cf56a89c06747409.exe 23 PID 3548 wrote to memory of 3444 3548 4de76ee6580af4b0cf56a89c06747409.exe 23 PID 3444 wrote to memory of 3552 3444 4de76ee6580af4b0cf56a89c06747409.exe 22 PID 3444 wrote to memory of 3552 3444 4de76ee6580af4b0cf56a89c06747409.exe 22 PID 3444 wrote to memory of 3552 3444 4de76ee6580af4b0cf56a89c06747409.exe 22 PID 3552 wrote to memory of 3360 3552 msq23.exe 21 PID 3552 wrote to memory of 3360 3552 msq23.exe 21 PID 3552 wrote to memory of 3360 3552 msq23.exe 21 PID 3552 wrote to memory of 3360 3552 msq23.exe 21 PID 3552 wrote to memory of 3360 3552 msq23.exe 21 PID 3360 wrote to memory of 3196 3360 msq23.exe 104 PID 3360 wrote to memory of 3196 3360 msq23.exe 104 PID 3360 wrote to memory of 3196 3360 msq23.exe 104 PID 3196 wrote to memory of 2468 3196 msq23.exe 103 PID 3196 wrote to memory of 2468 3196 msq23.exe 103 PID 3196 wrote to memory of 2468 3196 msq23.exe 103 PID 3196 wrote to memory of 2468 3196 msq23.exe 103 PID 3196 wrote to memory of 2468 3196 msq23.exe 103 PID 2468 wrote to memory of 4192 2468 msq23.exe 108 PID 2468 wrote to memory of 4192 2468 msq23.exe 108 PID 2468 wrote to memory of 4192 2468 msq23.exe 108 PID 4192 wrote to memory of 3544 4192 msq23.exe 107 PID 4192 wrote to memory of 3544 4192 msq23.exe 107 PID 4192 wrote to memory of 3544 4192 msq23.exe 107 PID 4192 wrote to memory of 3544 4192 msq23.exe 107 PID 4192 wrote to memory of 3544 4192 msq23.exe 107 PID 3544 wrote to memory of 408 3544 msq23.exe 111 PID 3544 wrote to memory of 408 3544 msq23.exe 111 PID 3544 wrote to memory of 408 3544 msq23.exe 111 PID 408 wrote to memory of 1620 408 msq23.exe 110 PID 408 wrote to memory of 1620 408 msq23.exe 110 PID 408 wrote to memory of 1620 408 msq23.exe 110 PID 408 wrote to memory of 1620 408 msq23.exe 110 PID 408 wrote to memory of 1620 408 msq23.exe 110 PID 1620 wrote to memory of 2008 1620 msq23.exe 112 PID 1620 wrote to memory of 2008 1620 msq23.exe 112 PID 1620 wrote to memory of 2008 1620 msq23.exe 112 PID 2008 wrote to memory of 2880 2008 msq23.exe 113 PID 2008 wrote to memory of 2880 2008 msq23.exe 113 PID 2008 wrote to memory of 2880 2008 msq23.exe 113 PID 2008 wrote to memory of 2880 2008 msq23.exe 113 PID 2008 wrote to memory of 2880 2008 msq23.exe 113 PID 2880 wrote to memory of 1800 2880 msq23.exe 115 PID 2880 wrote to memory of 1800 2880 msq23.exe 115 PID 2880 wrote to memory of 1800 2880 msq23.exe 115 PID 1800 wrote to memory of 876 1800 msq23.exe 116 PID 1800 wrote to memory of 876 1800 msq23.exe 116 PID 1800 wrote to memory of 876 1800 msq23.exe 116 PID 1800 wrote to memory of 876 1800 msq23.exe 116 PID 1800 wrote to memory of 876 1800 msq23.exe 116 PID 876 wrote to memory of 3264 876 msq23.exe 118 PID 876 wrote to memory of 3264 876 msq23.exe 118 PID 876 wrote to memory of 3264 876 msq23.exe 118 PID 3264 wrote to memory of 1392 3264 msq23.exe 117 PID 3264 wrote to memory of 1392 3264 msq23.exe 117 PID 3264 wrote to memory of 1392 3264 msq23.exe 117 PID 3264 wrote to memory of 1392 3264 msq23.exe 117 PID 3264 wrote to memory of 1392 3264 msq23.exe 117 PID 1392 wrote to memory of 4012 1392 msq23.exe 128 PID 1392 wrote to memory of 4012 1392 msq23.exe 128 PID 1392 wrote to memory of 4012 1392 msq23.exe 128
Processes
-
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 1148 "C:\Windows\SysWOW64\msq23.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3196
-
-
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 1112 "C:\Users\Admin\AppData\Local\Temp\4de76ee6580af4b0cf56a89c06747409.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3552
-
C:\Users\Admin\AppData\Local\Temp\4de76ee6580af4b0cf56a89c06747409.exeC:\Users\Admin\AppData\Local\Temp\4de76ee6580af4b0cf56a89c06747409.exe1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3444
-
C:\Users\Admin\AppData\Local\Temp\4de76ee6580af4b0cf56a89c06747409.exe"C:\Users\Admin\AppData\Local\Temp\4de76ee6580af4b0cf56a89c06747409.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3548
-
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 1124 "C:\Windows\SysWOW64\msq23.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4192
-
-
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 1100 "C:\Windows\SysWOW64\msq23.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:408
-
-
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 1112 "C:\Windows\SysWOW64\msq23.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 1124 "C:\Windows\SysWOW64\msq23.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 1124 "C:\Windows\SysWOW64\msq23.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3264
-
-
-
-
-
-
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 1120 "C:\Windows\SysWOW64\msq23.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2656 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 1120 "C:\Windows\SysWOW64\msq23.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe1⤵
- Executes dropped EXE
PID:3044 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 1124 "C:\Windows\SysWOW64\msq23.exe"2⤵PID:3996
-
-
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe1⤵PID:4584
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD55e88790bfcac6214edefeca074c9044f
SHA1db4f47efaee173ac31e475560d329dd1411f9e3c
SHA256153acd743d9262284b4e2a194b392736d50a4e8f179ad7373933a57d7ef73944
SHA512c48138c8f312247d2e335d2ff9eb5f3a7b22bd0c1cf86b603a4bd75efc82d8d6b4af547fa707aedadf10dd1c018f862b2c24c619871ab9d72cb48d299dd8fa7a
-
Filesize
153KB
MD549ede2f277ee600cc27027510cf7eaf0
SHA1d9b5231f5e6017e6429cdfc41384d987e279af64
SHA2564f48b7771c9d85207bf14d1d051a649ea6ebbcfb5ec28d4d7d238125ce2e5789
SHA5125b338bec6f0e05df218b4727ca952a7e4e6d73d3b8bf36e05a71f764c00fceda0e1d021917be6ca21fc66e02988d10d5131c7007b12c649c110dfcc57f0451cd
-
Filesize
98KB
MD5daeb4213700b1eb93b8ecbf86f2f4add
SHA17e86707f7cea02536c51f0de483390ed1ad05fd1
SHA256d8304ca4c143ae727f68d00a9a382c8610c1cde3584beefade478bee20d72274
SHA5129cd12358416871c7434e1ed876aabddef936845c3e6461e0864b089c6b7025026f7180ac969e0e2aa57c287abe58d1a914b9ca90c9ec2b974682d019a1377298
-
Filesize
203KB
MD54de76ee6580af4b0cf56a89c06747409
SHA13b05ce7f5e12ea8f7006e8eccc6ef2b8f64036c8
SHA256c3bc9e6f0941e4d4760202af0411b1a861956cb2f72e72e431cdf0fc479b9875
SHA5122c240bdabf9a8320ac2e9ed62fe75153bc1c47d2af7e6a331e0b2656be38009392b800c0066c1cd619f8f785e32fc26900e8eca33090f07d8fee663cfa95486d
-
Filesize
172KB
MD5e20fc6902d36cfe99cf718cf04f0a33d
SHA187786a179d9c9115dd799b00fd1e22918680d935
SHA2561df50b680f5378b0c3105b1f34c54df8a57e71bacffaf182aaf744bb15a3f9d9
SHA51287416d5f640c9fcf1651acaeb55c2f7bd51790cf83509c6dcd40c2054730c097f2cfa4abf7d743b8bd994745ea520a2bbfac2ff31755923ece2062031a73ce6a
-
Filesize
101KB
MD5c7ed5acc2aab89ef05f16df19d18e2c7
SHA199fc05ca3fa38f3e9d3d21344d599dfd208cdf2f
SHA2567aadb3771f482dd7a2d972f38d49acdf5d3bdb8b081ac79f2c175a6dfb586673
SHA512662c07bd88d00bf8919d5ac94b107ef021c232d20e5a061f3da29d7d409059403c8af61473be074c7edaf53fb80bc0905d19f7dc1974eea2e4fa6bd1c83802a6
-
Filesize
95KB
MD5935f7927a8c8511ef6847d0cc9b5fe7c
SHA130db43a7eff633afa0c6aca5f6fa94907e9f02a7
SHA2566274d88b00614adcd4f623a3d390fa7847f5365626a3f41267cf54c8c9fc0dc7
SHA5125f67c8e398f7fc24e5999dd8a4f40010c6cf2f2294bdc4c30472d9ee99ecf4e37597430a305778649cbca88a6b4e0d3182611e486992c289df5f8d8dbdd8055d
-
Filesize
178KB
MD51738391b8c7fba7a1b940e49bfc9b3d7
SHA155ab29be62c36bac3ab5d3652b6247cc38979143
SHA256c634d6a8d3dfa14fcf0cffa69859726897654b06f903f6360910be25dc325cec
SHA512c3d7a8b8cb449b6d59a47d7b0aa1f5ef263c4a007ad935e32deec8b03f0ebe7dab7d69a2a3529cdc3988f9e028ccb8a233eff195804219bbd793697fb0671332
-
Filesize
147KB
MD584c1cd2f019a10ac29670dc60ce3e394
SHA1bdd2433f4d803f2345a15eb96e078245a81871ec
SHA256a6bbf5a5bcd2fe0f72518ba31d1ef1298cbbb548c0a676fc3d161894f688f7b0
SHA5125dd067905f20054c83ec8b81e0377cf22a5ca547fbd431f461a3c65c777ae33cd51ca02bd4fac12eb033cab243c8312dba162df99ae9b3afef460df01d4c7012
-
Filesize
180KB
MD5a4e69df03a84ca341c55edaab1499a69
SHA1b0e3a85dcd821bfd1170dab1238047e43b4db772
SHA256720f9fae9387bf7317f8139a99baa420d46f1cd274d2f855204f702263f4f188
SHA5122ac7e0289cdace61a55c882dbb82d6efd6355206c8deedde45d29166a35e5b9b99a71b908a0481e7fb4adfc8de8f14c374eb86979aeca34ac3db4c899ede98c7
-
Filesize
83KB
MD5ec70ab9de5d348284d3fca2945df870f
SHA1b4c298ebf96d5dee521725ba7ce8afff6984f170
SHA256b710ec275f188d523a06a49b23460144be49e18aa0d167ccd66ad7628f54b18f
SHA512f10891170d0cb1e6992c77feaf10620c4db2ea5acaadb10ae04facaf449f17b145073e388c83dec8f96b63cecc39c2cdff0ebf6fc85b96fd15cdc8a1e5804f31
-
Filesize
179KB
MD5a78eee55e3256abebc309ada5ab24a12
SHA113210c014c3eb6562cf67c7f84162ee3119cf7fe
SHA256677b00ed68e2f841756e99dd99e7e96e6deaedb34f9dca7b7fd7a49342fb7bd5
SHA512441dde8064719f10a5281e9f47f85b4b7a6ec9f6ea5156df110408cf1c46e1b565f39f6b7ee7b890f990dc227d84ed979f358fdd1aa05a364d4b670f0f3746fc
-
Filesize
168KB
MD54df9b1e7fe9eb81184e5b6f99e6acdbe
SHA1e13cf0e9e13aa79838311606de0ffeddd099dd91
SHA2563d2612730f54c015e4858d571816878ad63fc7c3a703df7dca53a0bff7f01d34
SHA512b2418bf5cc3c1cc046a52e1dc937d43dd8a3fbb79aebd385e99a5c410465f0d6af0403411727ac0a39012ada2d56f0158423c1610abd92800c90071cfd96722b
-
Filesize
132KB
MD5b2d9adafaae9ee8773319c54d574a841
SHA1efa580951d12b94a1ec4399e87ddd3649731c52b
SHA25680aa09b2136c60e4bd35275771433ab1968540e71e62b2c54655d4531bdf9fc8
SHA512fa7e934f831e912a8e025edc376d35b18e2eaff6383c41e7da19f105101d032ffc18abfeffd7850627c7c2f80144d811c80795ffc1f514c48300a32efcf8ba35
-
Filesize
42KB
MD5a446cbcf32289204ba6666bf79864732
SHA10c554424357183686aee2a21e993d5c5aea8e688
SHA2561b8561ae679834cc2cbf5ac79ebf6e50b9ce1d7ccbc8e5664cf8a374e191367b
SHA51234c766ac565609f54d719f794b01edc08e303997366e21a5e5f515a934ad01ef8534b54e0b30defcc9452dbff866ff96f3bcc4a9879c2cc67a46295a2e9e5101
-
Filesize
67KB
MD508580a445e19bd6a1fa0f9e95d9bbc4b
SHA10d7e87479e215c567ee2f8de1fa1c0e5c815402b
SHA256cd0c9632587533f392aee90d2719887cec0e866b8de2ce4d7c9b2c7daf98ef80
SHA512593ed476d687cc7ef8ad5a426c128693a79cc7ff31357f082e517592cc9cb253e636790880a6209964cbd06a54ab19481591511175cf309c46247e23fa3050fc
-
Filesize
187KB
MD5c1b4adfd5e0df100f82298910950b9b4
SHA11a5bc5637c66ebd47349cf23457cd9604e639825
SHA256f1c6faa40df1598245c0d08560c1774e9ccd0a3fc1d75d18ca1efaa43e58972b
SHA512c8341b485e1e64152081e7251fdfa045242aa1759fa7024a98ad45f668cfa8ec372a45b8478bd984fcb808127915de705ad86a9b1fc87abff179fc7ae28e01d7