Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 15:55
Static task
static1
Behavioral task
behavioral1
Sample
9c1469f8ba783411fd423a514712ea7d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9c1469f8ba783411fd423a514712ea7d.exe
Resource
win10v2004-20231215-en
General
-
Target
9c1469f8ba783411fd423a514712ea7d.exe
-
Size
436KB
-
MD5
9c1469f8ba783411fd423a514712ea7d
-
SHA1
169c5eb0992408527bd2c5004159fe24275881d6
-
SHA256
aee0861cfce923acd94b0fd99412619f53d09a7c44147a460e0ac720de9f66a6
-
SHA512
f91731726d85cc5ddc846b49e7d7e22438ca5e639ab36edea11b78ba38892a451fc7a4d3ad9c4bac904d318dbbac32271a451aa415daf0a3c65177c60cfc0818
-
SSDEEP
6144:7WoLIrHuBwqWgshilBN77UZvsLPTJJaTdrZ9FHjOLVajAt7YHSSKj/Yem7wq4Mq7:6omO8hiDNUZvszXCd99wVajSqSnVdao
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2988 cmd.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Wine 9c1469f8ba783411fd423a514712ea7d.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllcache\wintcps.exe 9c1469f8ba783411fd423a514712ea7d.exe File opened for modification C:\Windows\SysWOW64\dllcache\wintcps.exe 9c1469f8ba783411fd423a514712ea7d.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2204 9c1469f8ba783411fd423a514712ea7d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2204 9c1469f8ba783411fd423a514712ea7d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2988 2204 9c1469f8ba783411fd423a514712ea7d.exe 28 PID 2204 wrote to memory of 2988 2204 9c1469f8ba783411fd423a514712ea7d.exe 28 PID 2204 wrote to memory of 2988 2204 9c1469f8ba783411fd423a514712ea7d.exe 28 PID 2204 wrote to memory of 2988 2204 9c1469f8ba783411fd423a514712ea7d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c1469f8ba783411fd423a514712ea7d.exe"C:\Users\Admin\AppData\Local\Temp\9c1469f8ba783411fd423a514712ea7d.exe"1⤵
- Identifies Wine through registry keys
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\9C1469~1.EXE > NUL2⤵
- Deletes itself
PID:2988
-