Analysis
-
max time kernel
115s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
e9e5280f0ef834435ddd568d2bb7c240N.exe
Resource
win7-20240705-en
General
-
Target
e9e5280f0ef834435ddd568d2bb7c240N.exe
-
Size
5KB
-
MD5
e9e5280f0ef834435ddd568d2bb7c240
-
SHA1
553e05ff696006097ff15c0ebe6ae6045dcffd5c
-
SHA256
f44056d7cddcb37c7d7130aa76b3b53dd008a248b3a044068d7b821246bb29f8
-
SHA512
c0df70a49b6c93ccfd66a175dcb635250c20f55822408b3de5fd4d3cc113e82667e83b571089bc7c2d0ad5a038b986dc4897817cc5f9c9e9059fa10734a45f2e
-
SSDEEP
96:1KDbGKINu62GnnfasTU9ig+vyGs7YdDjSxXCkwdkmApAccsYa6JhduV0:1KbGTN52+mi7yGsgaxy9q8aYhduV0
Malware Config
Extracted
metasploit
windows/reverse_tcp
194.59.31.31:1117
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/files/0x000900000001202f-109.dat family_xmrig behavioral1/files/0x000900000001202f-109.dat xmrig -
Executes dropped EXE 2 IoCs
pid Process 2916 WindowsUpdate.exe 2140 golang-woo.exe -
Loads dropped DLL 4 IoCs
pid Process 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe 2728 Process not Found 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9e5280f0ef834435ddd568d2bb7c240N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeAssignPrimaryTokenPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeAuditPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeBackupPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeChangeNotifyPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeCreateGlobalPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeCreatePagefilePrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeCreatePermanentPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: 35 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeCreateTokenPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeDebugPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: 0 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeEnableDelegationPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeImpersonatePrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeIncBasePriorityPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeIncreaseQuotaPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: 33 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeLoadDriverPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeLockMemoryPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeMachineAccountPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeManageVolumePrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeProfSingleProcessPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: 32 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeRemoteShutdownPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeRestorePrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeSecurityPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeShutdownPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeSyncAgentPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeSystemEnvironmentPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeSystemProfilePrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeSystemtimePrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeTakeOwnershipPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeTcbPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: 34 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: 31 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: SeUndockPrivilege 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe Token: 0 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 WindowsUpdate.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2916 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe 31 PID 2296 wrote to memory of 2916 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe 31 PID 2296 wrote to memory of 2916 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe 31 PID 2296 wrote to memory of 2916 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe 31 PID 2296 wrote to memory of 2140 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe 33 PID 2296 wrote to memory of 2140 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe 33 PID 2296 wrote to memory of 2140 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe 33 PID 2296 wrote to memory of 2140 2296 e9e5280f0ef834435ddd568d2bb7c240N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9e5280f0ef834435ddd568d2bb7c240N.exe"C:\Users\Admin\AppData\Local\Temp\e9e5280f0ef834435ddd568d2bb7c240N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exeWindowsUpdate.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\golang-woo.exegolang-woo.exe2⤵
- Executes dropped EXE
PID:2140
-
-
C:\Windows\system32\cmd.execmd.exe /c echo csfuzv > \\.\pipe\csfuzv1⤵PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.1MB
MD55fba8ae226b096da3b31de0e17496735
SHA1d532a01254cf9e0229d3c5803b78ff7c9b0cb8d3
SHA256ca28f4aeaa5e16d216cd828b67454a56f3c7feeb242412d26ed914fadff20d40
SHA512951e44fc0864a6741bcbb4227feb5429a032713dabd91102f4f0e27a69181ce7f23562e902cc09896ae26334b6d18caf0f5a13d81370bd703fd7ed6f78b47e72
-
Filesize
2KB
MD57a48e70aa2373571158cff1e773d84ab
SHA15aa406578bc4aa57ab869b15d3c6b3d3ff7e8e9e
SHA256afe0f9b5099c8fd5446872e88a6cb98e090157418bfa78c6a2f35731b2afc4b6
SHA512497509d8b457f33cba21f67e94ed207b9cf7e1866ede63d5f2f44483b75ec0673bc240e6634f02d1bf66e251227fc7ea652e784076a3020a3cd5c68ef291a616
-
Filesize
2.3MB
MD5a0a55d12504c014c089c22070432503a
SHA12908f6116969305e46c7881c13de6fd5db580882
SHA25634d0f0ac841c3ff7d5f1c33833d513a5abd56011f9c87bfb27c786255c9385b2
SHA5127eeee6b3a1bb4b4919346be46b65e12146a1069c260aa238d58986742d05604f5b568225a1dc5f4af7f84c7010832d1c90dd3249832cd307c734c6642c958bd0