Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 18:39
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240802-en
General
-
Target
file.exe
-
Size
522KB
-
MD5
06a0c92c691e980875b3345ce72fe78b
-
SHA1
ab38c20a9e04f0ffe951a194075c296373e3e367
-
SHA256
136e03127b12cc2b5242530339b24ad7c082741c152783d996b3fa63bc21f6de
-
SHA512
ea60783778989f0979e6edc25b4877d073ac7ea0a067fd7750a679eb6f380212e739ef07d6239911a4a3604e236ccdf65df6fd9faccd37f2c25116844e91f2cb
-
SSDEEP
12288:JzxzTDWikLSb4NS7QX+tjUXZkzF4Lyqe185h9pp3bQ/FO:zDWHSb4NkJ4S6hE/s
Malware Config
Extracted
metasploit
metasploit_stager
8.130.82.167:5544
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 1 IoCs
pid Process 2308 i0C.exe -
Loads dropped DLL 1 IoCs
pid Process 2824 file.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2736 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2736 WINWORD.EXE 2736 WINWORD.EXE 2736 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2308 2824 file.exe 31 PID 2824 wrote to memory of 2308 2824 file.exe 31 PID 2824 wrote to memory of 2308 2824 file.exe 31 PID 2824 wrote to memory of 2308 2824 file.exe 31 PID 2824 wrote to memory of 2736 2824 file.exe 32 PID 2824 wrote to memory of 2736 2824 file.exe 32 PID 2824 wrote to memory of 2736 2824 file.exe 32 PID 2824 wrote to memory of 2736 2824 file.exe 32 PID 2736 wrote to memory of 2200 2736 WINWORD.EXE 34 PID 2736 wrote to memory of 2200 2736 WINWORD.EXE 34 PID 2736 wrote to memory of 2200 2736 WINWORD.EXE 34 PID 2736 wrote to memory of 2200 2736 WINWORD.EXE 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\windows\temp\i0C.exe"C:\windows\temp\i0C.exe"2⤵
- Executes dropped EXE
PID:2308
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\windows\temp\3950.docx"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5acb59f522f3a18d32794e166b79f13e7
SHA153bfec3e07d056b4f0d24c6e8a82fb0b00ed8fbc
SHA256046ac24ef6d3b8813898dabc857289ad18db2240f550c6a077c3d3bcd8d1d35b
SHA512f626d8ef8593e96f2f6db8b437d4cccbe7fea6dd7c447f30e75b843c1a2e922957ed36072215fe9dc8b28429f3383bd3ffcfbfdc901e352ae32602b0917831de
-
Filesize
30KB
MD5daadd19803a76add7d5d0d707172c1d1
SHA1c9d71423fca459786073a6bdfa48f4a1636335ad
SHA25679c64517400d205f149825cb196576cdf9a2ce7d41b554d5065de0ec71ef1c29
SHA512ce567bacb900ed86f89c987020781bd3cb6e9cfc78d346e508d81c3d17ae9526ea89f7ce6f8c532211e36116397ea15ac9dcb91131f58e12a2c3df12a5acffa6
-
Filesize
650KB
MD598ce25fcd5b58bf3a90ba1b4c306cbc1
SHA193f89bf4754809702df814db2be8f2d905128402
SHA256b3174a40b59341a5604ac5878c80ec7033f223c4122ff407c1c61a5231dea84e
SHA51201ca4d9bfd35944f8888713a296f857e9b7c7f72a4f1883cd56089b728c2056576e7e48dfd877b506653054beeee9a0982b48d4718dd7fac3f8830e9a26615c8