Analysis
-
max time kernel
137s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-03-2024 21:39
Behavioral task
behavioral1
Sample
b9b8a0f4d78315c436c9d6b6699952fe.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9b8a0f4d78315c436c9d6b6699952fe.exe
Resource
win10v2004-20240226-en
General
-
Target
b9b8a0f4d78315c436c9d6b6699952fe.exe
-
Size
400KB
-
MD5
b9b8a0f4d78315c436c9d6b6699952fe
-
SHA1
eb01d19aba86beed4e5ecf88bb7b1565531efa07
-
SHA256
32e4d84e634fd4d7c979f0008fe32c21a0713eed09caba58e85dca3bb9e772dc
-
SHA512
ea8ace598443ebccc21fb0e30aff121604ccb28d4bda9e7dd44a2c5d92bfd61467520b75a427a7d79aefcc6d492b04bf6fc1a45b5f3f80583bf3437c87990814
-
SSDEEP
6144:4u5g79cOY/LnJCPEQ42F+40HG5W2s4ugIueUQjiEzMtm6187Un:4u5g79cV/QELG+40HG504nIuRQjizRn
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 10 IoCs
pid Process 2100 taskmrg.exe 4276 taskmrg.exe 3012 taskmrg.exe 2864 taskmrg.exe 4056 taskmrg.exe 2232 taskmrg.exe 3780 taskmrg.exe 1348 taskmrg.exe 116 taskmrg.exe 3568 taskmrg.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe b9b8a0f4d78315c436c9d6b6699952fe.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe b9b8a0f4d78315c436c9d6b6699952fe.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2100 2320 b9b8a0f4d78315c436c9d6b6699952fe.exe 92 PID 2320 wrote to memory of 2100 2320 b9b8a0f4d78315c436c9d6b6699952fe.exe 92 PID 2320 wrote to memory of 2100 2320 b9b8a0f4d78315c436c9d6b6699952fe.exe 92 PID 2100 wrote to memory of 4276 2100 taskmrg.exe 102 PID 2100 wrote to memory of 4276 2100 taskmrg.exe 102 PID 2100 wrote to memory of 4276 2100 taskmrg.exe 102 PID 4276 wrote to memory of 3012 4276 taskmrg.exe 107 PID 4276 wrote to memory of 3012 4276 taskmrg.exe 107 PID 4276 wrote to memory of 3012 4276 taskmrg.exe 107 PID 3012 wrote to memory of 2864 3012 taskmrg.exe 109 PID 3012 wrote to memory of 2864 3012 taskmrg.exe 109 PID 3012 wrote to memory of 2864 3012 taskmrg.exe 109 PID 2864 wrote to memory of 4056 2864 taskmrg.exe 110 PID 2864 wrote to memory of 4056 2864 taskmrg.exe 110 PID 2864 wrote to memory of 4056 2864 taskmrg.exe 110 PID 4056 wrote to memory of 2232 4056 taskmrg.exe 112 PID 4056 wrote to memory of 2232 4056 taskmrg.exe 112 PID 4056 wrote to memory of 2232 4056 taskmrg.exe 112 PID 2232 wrote to memory of 3780 2232 taskmrg.exe 113 PID 2232 wrote to memory of 3780 2232 taskmrg.exe 113 PID 2232 wrote to memory of 3780 2232 taskmrg.exe 113 PID 3780 wrote to memory of 1348 3780 taskmrg.exe 121 PID 3780 wrote to memory of 1348 3780 taskmrg.exe 121 PID 3780 wrote to memory of 1348 3780 taskmrg.exe 121 PID 1348 wrote to memory of 116 1348 taskmrg.exe 122 PID 1348 wrote to memory of 116 1348 taskmrg.exe 122 PID 1348 wrote to memory of 116 1348 taskmrg.exe 122 PID 116 wrote to memory of 3568 116 taskmrg.exe 125 PID 116 wrote to memory of 3568 116 taskmrg.exe 125 PID 116 wrote to memory of 3568 116 taskmrg.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9b8a0f4d78315c436c9d6b6699952fe.exe"C:\Users\Admin\AppData\Local\Temp\b9b8a0f4d78315c436c9d6b6699952fe.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1196 "C:\Users\Admin\AppData\Local\Temp\b9b8a0f4d78315c436c9d6b6699952fe.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1148 "C:\Windows\SysWOW64\taskmrg.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1124 "C:\Windows\SysWOW64\taskmrg.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1120 "C:\Windows\SysWOW64\taskmrg.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1132 "C:\Windows\SysWOW64\taskmrg.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1128 "C:\Windows\SysWOW64\taskmrg.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1156 "C:\Windows\SysWOW64\taskmrg.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1100 "C:\Windows\SysWOW64\taskmrg.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1096 "C:\Windows\SysWOW64\taskmrg.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1152 "C:\Windows\SysWOW64\taskmrg.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3568
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD5b9b8a0f4d78315c436c9d6b6699952fe
SHA1eb01d19aba86beed4e5ecf88bb7b1565531efa07
SHA25632e4d84e634fd4d7c979f0008fe32c21a0713eed09caba58e85dca3bb9e772dc
SHA512ea8ace598443ebccc21fb0e30aff121604ccb28d4bda9e7dd44a2c5d92bfd61467520b75a427a7d79aefcc6d492b04bf6fc1a45b5f3f80583bf3437c87990814