Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 13:02
Behavioral task
behavioral1
Sample
5688a22c882e60b2cd2f2cc72601757a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5688a22c882e60b2cd2f2cc72601757a.exe
Resource
win10v2004-20231215-en
General
-
Target
5688a22c882e60b2cd2f2cc72601757a.exe
-
Size
145KB
-
MD5
5688a22c882e60b2cd2f2cc72601757a
-
SHA1
444f49bf79dcdaa9a92dc62a9fe6ae3b0fe3b4fd
-
SHA256
6083316ee01a2fee563a39e1dbc12b9042ec2c0ac87ddf0b2215e33fda2e1875
-
SHA512
b709400c7f79b09a3da2f6969c4b7256cfb49dc3e42763506cf0a4ac81500d04e4fac70ad16b75ee50767ae645b97d2c39e1b591eab5df5d7c4db6a20811fc3e
-
SSDEEP
3072:f7nTa+mRUBCVIFedDNG/A88pN4s/OwEx1AK6lb9Qt:Ha+mOBCVI8dZcQqNzAr9Q
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 2 IoCs
pid Process 2464 csrss.exe 2860 csrss.exe -
resource yara_rule behavioral1/memory/1188-0-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/1188-14-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/files/0x000d0000000122dc-29.dat upx behavioral1/memory/2464-30-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2464-48-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Data Serivce = "csrss.exe" 5688a22c882e60b2cd2f2cc72601757a.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1188 set thread context of 2568 1188 5688a22c882e60b2cd2f2cc72601757a.exe 28 PID 2464 set thread context of 2860 2464 csrss.exe 34 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\csrss.exe 5688a22c882e60b2cd2f2cc72601757a.exe File opened for modification C:\Windows\csrss.exe 5688a22c882e60b2cd2f2cc72601757a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2568 1188 5688a22c882e60b2cd2f2cc72601757a.exe 28 PID 1188 wrote to memory of 2568 1188 5688a22c882e60b2cd2f2cc72601757a.exe 28 PID 1188 wrote to memory of 2568 1188 5688a22c882e60b2cd2f2cc72601757a.exe 28 PID 1188 wrote to memory of 2568 1188 5688a22c882e60b2cd2f2cc72601757a.exe 28 PID 1188 wrote to memory of 2568 1188 5688a22c882e60b2cd2f2cc72601757a.exe 28 PID 1188 wrote to memory of 2568 1188 5688a22c882e60b2cd2f2cc72601757a.exe 28 PID 1188 wrote to memory of 2568 1188 5688a22c882e60b2cd2f2cc72601757a.exe 28 PID 1188 wrote to memory of 2568 1188 5688a22c882e60b2cd2f2cc72601757a.exe 28 PID 1188 wrote to memory of 2568 1188 5688a22c882e60b2cd2f2cc72601757a.exe 28 PID 2568 wrote to memory of 2748 2568 5688a22c882e60b2cd2f2cc72601757a.exe 29 PID 2568 wrote to memory of 2748 2568 5688a22c882e60b2cd2f2cc72601757a.exe 29 PID 2568 wrote to memory of 2748 2568 5688a22c882e60b2cd2f2cc72601757a.exe 29 PID 2568 wrote to memory of 2748 2568 5688a22c882e60b2cd2f2cc72601757a.exe 29 PID 2568 wrote to memory of 2464 2568 5688a22c882e60b2cd2f2cc72601757a.exe 31 PID 2568 wrote to memory of 2464 2568 5688a22c882e60b2cd2f2cc72601757a.exe 31 PID 2568 wrote to memory of 2464 2568 5688a22c882e60b2cd2f2cc72601757a.exe 31 PID 2568 wrote to memory of 2464 2568 5688a22c882e60b2cd2f2cc72601757a.exe 31 PID 2748 wrote to memory of 2864 2748 cmd.exe 32 PID 2748 wrote to memory of 2864 2748 cmd.exe 32 PID 2748 wrote to memory of 2864 2748 cmd.exe 32 PID 2748 wrote to memory of 2864 2748 cmd.exe 32 PID 2864 wrote to memory of 3036 2864 net.exe 33 PID 2864 wrote to memory of 3036 2864 net.exe 33 PID 2864 wrote to memory of 3036 2864 net.exe 33 PID 2864 wrote to memory of 3036 2864 net.exe 33 PID 2464 wrote to memory of 2860 2464 csrss.exe 34 PID 2464 wrote to memory of 2860 2464 csrss.exe 34 PID 2464 wrote to memory of 2860 2464 csrss.exe 34 PID 2464 wrote to memory of 2860 2464 csrss.exe 34 PID 2464 wrote to memory of 2860 2464 csrss.exe 34 PID 2464 wrote to memory of 2860 2464 csrss.exe 34 PID 2464 wrote to memory of 2860 2464 csrss.exe 34 PID 2464 wrote to memory of 2860 2464 csrss.exe 34 PID 2464 wrote to memory of 2860 2464 csrss.exe 34 PID 2860 wrote to memory of 1888 2860 csrss.exe 35 PID 2860 wrote to memory of 1888 2860 csrss.exe 35 PID 2860 wrote to memory of 1888 2860 csrss.exe 35 PID 2860 wrote to memory of 1888 2860 csrss.exe 35 PID 1888 wrote to memory of 3016 1888 cmd.exe 37 PID 1888 wrote to memory of 3016 1888 cmd.exe 37 PID 1888 wrote to memory of 3016 1888 cmd.exe 37 PID 1888 wrote to memory of 3016 1888 cmd.exe 37 PID 3016 wrote to memory of 3032 3016 net.exe 38 PID 3016 wrote to memory of 3032 3016 net.exe 38 PID 3016 wrote to memory of 3032 3016 net.exe 38 PID 3016 wrote to memory of 3032 3016 net.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\5688a22c882e60b2cd2f2cc72601757a.exe"C:\Users\Admin\AppData\Local\Temp\5688a22c882e60b2cd2f2cc72601757a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\5688a22c882e60b2cd2f2cc72601757a.exe"C:\Users\Admin\AppData\Local\Temp\5688a22c882e60b2cd2f2cc72601757a.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\x.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"4⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵PID:3036
-
-
-
-
C:\Windows\csrss.exe"C:\Windows\csrss.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\csrss.exe"C:\Windows\csrss.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\x.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"6⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"7⤵PID:3032
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145KB
MD55688a22c882e60b2cd2f2cc72601757a
SHA1444f49bf79dcdaa9a92dc62a9fe6ae3b0fe3b4fd
SHA2566083316ee01a2fee563a39e1dbc12b9042ec2c0ac87ddf0b2215e33fda2e1875
SHA512b709400c7f79b09a3da2f6969c4b7256cfb49dc3e42763506cf0a4ac81500d04e4fac70ad16b75ee50767ae645b97d2c39e1b591eab5df5d7c4db6a20811fc3e
-
Filesize
53B
MD5e6ed7be2b9572503f07663ca6e53759f
SHA17ad80bd38f2a27e06c111b551c76ad0a0585c194
SHA256b1a6c027d18eb5766129a059f68201e6fb8c68d095f3932983009fe5ae2e4df9
SHA512e0010782b4fe567290536743375112db3107f8390d4c5cbb97f1bf1a8c83825399e1fe2fe9793d351896bb704f3bdec583fa7241b853b136fa9440a927d94227