Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
8d6821e1b2ca8c76d1d5f15bf4f838a7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d6821e1b2ca8c76d1d5f15bf4f838a7.exe
Resource
win10v2004-20231215-en
General
-
Target
8d6821e1b2ca8c76d1d5f15bf4f838a7.exe
-
Size
143KB
-
MD5
8d6821e1b2ca8c76d1d5f15bf4f838a7
-
SHA1
040895bce4309207090f8ae51263f96948643daa
-
SHA256
ab0bbc950ef2066a74e80ed1fab7951f2feefbfed35f71f1ff1e6a65273e9bb1
-
SHA512
b7b4c74ad36958e98ed3f961720c74a0908023639f155fb5b06b1a8c0ab867d012315bf8abca1d636d199d6e630036a9413a9f1ae901e4e1b4076a9c3df0cf4b
-
SSDEEP
3072:AMGIkXgig5iuvINdcsnIKaHiyI0TelORghzIdeZw:AMGI9igGNaskmvoglIdeK
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe -
Executes dropped EXE 2 IoCs
pid Process 1276 svchost.exe 5088 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Service Host = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe" 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Service Host = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe" svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3076 set thread context of 4328 3076 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 92 PID 1276 set thread context of 5088 1276 svchost.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4328 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe Token: SeShutdownPrivilege 4328 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe Token: SeDebugPrivilege 5088 svchost.exe Token: SeShutdownPrivilege 5088 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3076 wrote to memory of 4328 3076 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 92 PID 3076 wrote to memory of 4328 3076 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 92 PID 3076 wrote to memory of 4328 3076 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 92 PID 3076 wrote to memory of 4328 3076 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 92 PID 3076 wrote to memory of 4328 3076 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 92 PID 4328 wrote to memory of 1276 4328 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 95 PID 4328 wrote to memory of 1276 4328 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 95 PID 4328 wrote to memory of 1276 4328 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 95 PID 4328 wrote to memory of 5040 4328 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 96 PID 4328 wrote to memory of 5040 4328 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 96 PID 4328 wrote to memory of 5040 4328 8d6821e1b2ca8c76d1d5f15bf4f838a7.exe 96 PID 1276 wrote to memory of 5088 1276 svchost.exe 98 PID 1276 wrote to memory of 5088 1276 svchost.exe 98 PID 1276 wrote to memory of 5088 1276 svchost.exe 98 PID 1276 wrote to memory of 5088 1276 svchost.exe 98 PID 1276 wrote to memory of 5088 1276 svchost.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d6821e1b2ca8c76d1d5f15bf4f838a7.exe"C:\Users\Admin\AppData\Local\Temp\8d6821e1b2ca8c76d1d5f15bf4f838a7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\8d6821e1b2ca8c76d1d5f15bf4f838a7.exeC:\Users\Admin\AppData\Local\Temp\8d6821e1b2ca8c76d1d5f15bf4f838a7.exe C:\Documents an2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Documents an4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\8D6821~1.EXE" >> NUL3⤵PID:5040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143KB
MD58d6821e1b2ca8c76d1d5f15bf4f838a7
SHA1040895bce4309207090f8ae51263f96948643daa
SHA256ab0bbc950ef2066a74e80ed1fab7951f2feefbfed35f71f1ff1e6a65273e9bb1
SHA512b7b4c74ad36958e98ed3f961720c74a0908023639f155fb5b06b1a8c0ab867d012315bf8abca1d636d199d6e630036a9413a9f1ae901e4e1b4076a9c3df0cf4b