Analysis
-
max time kernel
80s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
8d6821e1b2ca8c76d1d5f15bf4f838a7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d6821e1b2ca8c76d1d5f15bf4f838a7.exe
Resource
win10v2004-20231215-en
General
-
Target
8d6821e1b2ca8c76d1d5f15bf4f838a7.exe
-
Size
143KB
-
MD5
8d6821e1b2ca8c76d1d5f15bf4f838a7
-
SHA1
040895bce4309207090f8ae51263f96948643daa
-
SHA256
ab0bbc950ef2066a74e80ed1fab7951f2feefbfed35f71f1ff1e6a65273e9bb1
-
SHA512
b7b4c74ad36958e98ed3f961720c74a0908023639f155fb5b06b1a8c0ab867d012315bf8abca1d636d199d6e630036a9413a9f1ae901e4e1b4076a9c3df0cf4b
-
SSDEEP
3072:AMGIkXgig5iuvINdcsnIKaHiyI0TelORghzIdeZw:AMGI9igGNaskmvoglIdeK
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2676 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2780 svchost.exe 2960 svchost.exe -
Loads dropped DLL 3 IoCs
pid Process 2740 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 2740 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 2780 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Host = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe" 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Host = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe" svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2632 set thread context of 2740 2632 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 28 PID 2780 set thread context of 2960 2780 svchost.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2740 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe Token: SeShutdownPrivilege 2740 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe Token: SeDebugPrivilege 2960 svchost.exe Token: SeShutdownPrivilege 2960 svchost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2740 2632 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 28 PID 2632 wrote to memory of 2740 2632 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 28 PID 2632 wrote to memory of 2740 2632 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 28 PID 2632 wrote to memory of 2740 2632 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 28 PID 2632 wrote to memory of 2740 2632 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 28 PID 2632 wrote to memory of 2740 2632 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 28 PID 2740 wrote to memory of 2780 2740 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 29 PID 2740 wrote to memory of 2780 2740 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 29 PID 2740 wrote to memory of 2780 2740 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 29 PID 2740 wrote to memory of 2780 2740 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 29 PID 2740 wrote to memory of 2676 2740 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 30 PID 2740 wrote to memory of 2676 2740 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 30 PID 2740 wrote to memory of 2676 2740 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 30 PID 2740 wrote to memory of 2676 2740 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 30 PID 2780 wrote to memory of 2960 2780 svchost.exe 32 PID 2780 wrote to memory of 2960 2780 svchost.exe 32 PID 2780 wrote to memory of 2960 2780 svchost.exe 32 PID 2780 wrote to memory of 2960 2780 svchost.exe 32 PID 2780 wrote to memory of 2960 2780 svchost.exe 32 PID 2780 wrote to memory of 2960 2780 svchost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d6821e1b2ca8c76d1d5f15bf4f838a7.exe"C:\Users\Admin\AppData\Local\Temp\8d6821e1b2ca8c76d1d5f15bf4f838a7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\8d6821e1b2ca8c76d1d5f15bf4f838a7.exeC:\Users\Admin\AppData\Local\Temp\8d6821e1b2ca8c76d1d5f15bf4f838a7.exe C:\Documents an2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Documents an4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\8D6821~1.EXE" >> NUL3⤵
- Deletes itself
PID:2676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143KB
MD58d6821e1b2ca8c76d1d5f15bf4f838a7
SHA1040895bce4309207090f8ae51263f96948643daa
SHA256ab0bbc950ef2066a74e80ed1fab7951f2feefbfed35f71f1ff1e6a65273e9bb1
SHA512b7b4c74ad36958e98ed3f961720c74a0908023639f155fb5b06b1a8c0ab867d012315bf8abca1d636d199d6e630036a9413a9f1ae901e4e1b4076a9c3df0cf4b