Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 03:04
Static task
static1
Behavioral task
behavioral1
Sample
525cdf884cc6249aed4349cb5f6ae90a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
525cdf884cc6249aed4349cb5f6ae90a.exe
Resource
win10v2004-20231215-en
General
-
Target
525cdf884cc6249aed4349cb5f6ae90a.exe
-
Size
52KB
-
MD5
525cdf884cc6249aed4349cb5f6ae90a
-
SHA1
40e73ef87d4a3c5c4ddbab4a08480e229ed072d5
-
SHA256
720f4aaaf0025efe267c870a293e418e964ebce84c8cd48173a90f35bfae2404
-
SHA512
dbec2bcfdf9b0509f42f37968a7fbe6da4bdd49820a7af3edfa605a6333a5237c19a03f142013163d951180676b09b43386ee806db2cff6b4d5888615201e38d
-
SSDEEP
768:qVjgo/y8uAX5OT6kwonP9iN5dpy6TlFDu6YDd3QAwgjpWfhwiYsOR:KpOTflnliN5dLDibdlwgQfhusOR
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 525cdf884cc6249aed4349cb5f6ae90a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\aadrive32.exe" 525cdf884cc6249aed4349cb5f6ae90a.exe -
Executes dropped EXE 2 IoCs
pid Process 916 aadrive32.exe 4640 aadrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\aadrive32.exe" 525cdf884cc6249aed4349cb5f6ae90a.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2248 set thread context of 4292 2248 525cdf884cc6249aed4349cb5f6ae90a.exe 83 PID 916 set thread context of 4640 916 aadrive32.exe 97 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\aadrive32.exe 525cdf884cc6249aed4349cb5f6ae90a.exe File opened for modification C:\Windows\aadrive32.exe 525cdf884cc6249aed4349cb5f6ae90a.exe File created C:\Windows\%windir%\lfffile32.log aadrive32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4292 525cdf884cc6249aed4349cb5f6ae90a.exe 4292 525cdf884cc6249aed4349cb5f6ae90a.exe 4292 525cdf884cc6249aed4349cb5f6ae90a.exe 4292 525cdf884cc6249aed4349cb5f6ae90a.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2248 wrote to memory of 4292 2248 525cdf884cc6249aed4349cb5f6ae90a.exe 83 PID 2248 wrote to memory of 4292 2248 525cdf884cc6249aed4349cb5f6ae90a.exe 83 PID 2248 wrote to memory of 4292 2248 525cdf884cc6249aed4349cb5f6ae90a.exe 83 PID 2248 wrote to memory of 4292 2248 525cdf884cc6249aed4349cb5f6ae90a.exe 83 PID 2248 wrote to memory of 4292 2248 525cdf884cc6249aed4349cb5f6ae90a.exe 83 PID 2248 wrote to memory of 4292 2248 525cdf884cc6249aed4349cb5f6ae90a.exe 83 PID 2248 wrote to memory of 4292 2248 525cdf884cc6249aed4349cb5f6ae90a.exe 83 PID 4292 wrote to memory of 916 4292 525cdf884cc6249aed4349cb5f6ae90a.exe 91 PID 4292 wrote to memory of 916 4292 525cdf884cc6249aed4349cb5f6ae90a.exe 91 PID 4292 wrote to memory of 916 4292 525cdf884cc6249aed4349cb5f6ae90a.exe 91 PID 916 wrote to memory of 4640 916 aadrive32.exe 97 PID 916 wrote to memory of 4640 916 aadrive32.exe 97 PID 916 wrote to memory of 4640 916 aadrive32.exe 97 PID 916 wrote to memory of 4640 916 aadrive32.exe 97 PID 916 wrote to memory of 4640 916 aadrive32.exe 97 PID 916 wrote to memory of 4640 916 aadrive32.exe 97 PID 916 wrote to memory of 4640 916 aadrive32.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\525cdf884cc6249aed4349cb5f6ae90a.exe"C:\Users\Admin\AppData\Local\Temp\525cdf884cc6249aed4349cb5f6ae90a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\525cdf884cc6249aed4349cb5f6ae90a.exe"C:\Users\Admin\AppData\Local\Temp\525cdf884cc6249aed4349cb5f6ae90a.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\aadrive32.exe"C:\Windows\aadrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\aadrive32.exe"C:\Windows\aadrive32.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4640
-
-
-