Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    21/01/2024, 12:12

General

  • Target

    6d47b57641c1a77dfee5936f57acd3a5.exe

  • Size

    192KB

  • MD5

    6d47b57641c1a77dfee5936f57acd3a5

  • SHA1

    0b18c34470f2bf4a842682d6ed4b8842e275b89f

  • SHA256

    85057d4de7a020aa015e2ffec53288027ce475e3df426e462bb7beffbab91ca6

  • SHA512

    d593236dcab8d2e38c20c05621f12374ec7033108778f687a46204630bf92ebccd320d8cab27cbb1dab8c281ff5b675f14500345289178a5f7bb2182d0d6d485

  • SSDEEP

    3072:JpLBJINfkw8GlYsWJYmi1uUF0HprVtWKBMR7PlPB2:JZ812WOph/MRT58

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Windows\system32\sppsvc.exe
    C:\Windows\system32\sppsvc.exe
    1⤵
      PID:1628
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
      1⤵
        PID:2320
      • C:\Windows\system32\wbem\wmiprvse.exe
        C:\Windows\system32\wbem\wmiprvse.exe
        1⤵
          PID:1500
        • C:\Users\Admin\AppData\Local\Temp\6d47b57641c1a77dfee5936f57acd3a5.exe
          "C:\Users\Admin\AppData\Local\Temp\6d47b57641c1a77dfee5936f57acd3a5.exe"
          1⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2168
          • C:\Users\Admin\AppData\Local\Temp\6d47b57641c1a77dfee5936f57acd3a5.exe
            "C:\Users\Admin\AppData\Local\Temp\6d47b57641c1a77dfee5936f57acd3a5.exe"
            2⤵
            • Loads dropped DLL
            • Maps connected drives based on registry
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2472
            • C:\Windows\SysWOW64\wmpdb32.exe
              "C:\Windows\SysWOW64\wmpdb32.exe" C:\Users\Admin\AppData\Local\Temp\6D47B5~1.EXE
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2752
              • C:\Windows\SysWOW64\wmpdb32.exe
                "C:\Windows\SysWOW64\wmpdb32.exe" C:\Users\Admin\AppData\Local\Temp\6D47B5~1.EXE
                4⤵
                • Modifies firewall policy service
                • Deletes itself
                • Executes dropped EXE
                • Adds Run key to start application
                • Maps connected drives based on registry
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2668
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
          1⤵
            PID:1156
          • C:\Windows\system32\taskhost.exe
            "taskhost.exe"
            1⤵
              PID:1112
            • C:\Windows\System32\spoolsv.exe
              C:\Windows\System32\spoolsv.exe
              1⤵
                PID:1104
              • C:\Windows\Explorer.EXE
                C:\Windows\Explorer.EXE
                1⤵
                  PID:1072
                • C:\Windows\system32\Dwm.exe
                  "C:\Windows\system32\Dwm.exe"
                  1⤵
                    PID:1044
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k NetworkService
                    1⤵
                      PID:272
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalService
                      1⤵
                        PID:980
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs
                        1⤵
                          PID:860
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                          1⤵
                            PID:824
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                            1⤵
                              PID:756
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k RPCSS
                              1⤵
                                PID:684
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k DcomLaunch
                                1⤵
                                  PID:604
                                • C:\Windows\system32\lsm.exe
                                  C:\Windows\system32\lsm.exe
                                  1⤵
                                    PID:504
                                  • C:\Windows\system32\services.exe
                                    C:\Windows\system32\services.exe
                                    1⤵
                                      PID:480
                                    • C:\Windows\system32\winlogon.exe
                                      winlogon.exe
                                      1⤵
                                        PID:436
                                      • C:\Windows\system32\wininit.exe
                                        wininit.exe
                                        1⤵
                                          PID:388
                                        • C:\Windows\System32\smss.exe
                                          \SystemRoot\System32\smss.exe
                                          1⤵
                                            PID:260

                                          Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • \Windows\SysWOW64\wmpdb32.exe

                                                  Filesize

                                                  192KB

                                                  MD5

                                                  6d47b57641c1a77dfee5936f57acd3a5

                                                  SHA1

                                                  0b18c34470f2bf4a842682d6ed4b8842e275b89f

                                                  SHA256

                                                  85057d4de7a020aa015e2ffec53288027ce475e3df426e462bb7beffbab91ca6

                                                  SHA512

                                                  d593236dcab8d2e38c20c05621f12374ec7033108778f687a46204630bf92ebccd320d8cab27cbb1dab8c281ff5b675f14500345289178a5f7bb2182d0d6d485

                                                • memory/436-36-0x0000000000320000-0x0000000000321000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/436-35-0x00000000004F0000-0x000000000050E000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/2472-7-0x0000000000400000-0x0000000000458000-memory.dmp

                                                  Filesize

                                                  352KB

                                                • memory/2472-3-0x0000000000400000-0x0000000000458000-memory.dmp

                                                  Filesize

                                                  352KB

                                                • memory/2472-6-0x0000000000400000-0x0000000000458000-memory.dmp

                                                  Filesize

                                                  352KB

                                                • memory/2472-9-0x0000000000400000-0x0000000000458000-memory.dmp

                                                  Filesize

                                                  352KB

                                                • memory/2472-8-0x0000000000400000-0x0000000000458000-memory.dmp

                                                  Filesize

                                                  352KB

                                                • memory/2472-4-0x0000000000400000-0x0000000000458000-memory.dmp

                                                  Filesize

                                                  352KB

                                                • memory/2472-20-0x0000000000400000-0x0000000000458000-memory.dmp

                                                  Filesize

                                                  352KB

                                                • memory/2472-2-0x0000000000400000-0x0000000000458000-memory.dmp

                                                  Filesize

                                                  352KB

                                                • memory/2472-0-0x0000000000400000-0x0000000000458000-memory.dmp

                                                  Filesize

                                                  352KB

                                                • memory/2668-33-0x0000000000400000-0x0000000000458000-memory.dmp

                                                  Filesize

                                                  352KB

                                                • memory/2668-34-0x0000000000400000-0x0000000000458000-memory.dmp

                                                  Filesize

                                                  352KB

                                                • memory/2668-32-0x0000000000400000-0x0000000000458000-memory.dmp

                                                  Filesize

                                                  352KB

                                                • memory/2668-38-0x0000000000400000-0x0000000000458000-memory.dmp

                                                  Filesize

                                                  352KB

                                                • memory/2668-57-0x0000000000400000-0x0000000000458000-memory.dmp

                                                  Filesize

                                                  352KB

                                                • memory/2668-67-0x0000000000400000-0x0000000000458000-memory.dmp

                                                  Filesize

                                                  352KB