Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2024 07:51

General

  • Target

    096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe

  • Size

    4.0MB

  • MD5

    73f86717725bdb7c72c04f47191f155b

  • SHA1

    52baad3486c9b5e04aa4e07eeec8ff67c861d65b

  • SHA256

    096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31

  • SHA512

    e54c85a61e0a2d98ef0488690f4da23ec98cdb51dae4752982a28ff512f4dfe05a4c692e75d11ce0aaa9e4a1412d22562b527eaf0ea9d1f5c7ed43405ff83155

  • SSDEEP

    49152:i1ZXtxDOmWP0pVfuFt37RW9/9pSTQSpItLc8a2n7s+TTCP0VXbpX5Sl35mjAYRGo:atxKmWMs3RW9o4P7hTbM

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.5.9:6789

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 2 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe
    "C:\Users\Admin\AppData\Local\Temp\096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe"
    1⤵
    • Checks computer location settings
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4008
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Windows\temp\cpuz_driver_4008.log
      2⤵
      • System Location Discovery: System Language Discovery
      • Opens file in notepad (likely ransom note)
      PID:3784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Temp\cpuz_driver_4008.log

    Filesize

    1KB

    MD5

    bf44aaef1b58aca9067fdb8294235484

    SHA1

    2da88020408668e8d86236dfbb514583c2a98499

    SHA256

    b9728dfec703d7fdf2a2953f006477857daad814f3683c94c9a7175227c38745

    SHA512

    e14f0f378d2165495195f2395a6aee5d55d2bff62874de107009673716458418b4232e0c3085c5c2e64bff9701cceea2f497bbf7de6e41a17fda58ddbaebed05

  • C:\Windows\Temp\cpuz_driver_4008.log

    Filesize

    2KB

    MD5

    d7c463fce8e91f67105b3a3afac8a24e

    SHA1

    e4b3983087dcaa7f44eac206fa84f9faf5d99b32

    SHA256

    44ddf97f159ecc717f54b9ce5d0aa9e701091d141e18fe491e457c61cbad654a

    SHA512

    3f72525300eb3d985c4dc1206af4645eca51cf57a58385d5a2a484e20abf1ecd49e9ab776797ee57b348af8044827d32ac872d649a46e1bb83465c4f56a96d84

  • C:\Windows\Temp\cpuz_driver_4008.log

    Filesize

    1KB

    MD5

    35ea302e34ca04d7c312f0c2c5acfa3d

    SHA1

    cef5bae5f1c8745103872671c8c0f7e249854c2f

    SHA256

    fce8b208a890659269b25b85681fc09f7b17e55becb21b33a8a70097b9cca1f9

    SHA512

    8513be445263a114b107a3a8961c7963e2ff3a1f21d21b5718dec9eedf717aaa23cb43315a066b2b6344755e713587016e26dbcff3254292dcd41e62375817ef

  • C:\Windows\temp\cpuz_driver_4008.log

    Filesize

    2KB

    MD5

    5193c93dc66c1541534f86c0a868e538

    SHA1

    e05d751722e328ea6913e018b5a60a8472a03151

    SHA256

    90b3f9c7a8753dc7f8c25c96bcd26e00dea2ad1e9ff7157bd2ce74ef0f6da55a

    SHA512

    64bae67491ec0a794348a948e2ac721af923cee68e5ff0bdb842868782e825cdd05b084b1d200341d50a1b6d29440410e31bf641634a5ce15f50cc0d2fcd2b25

  • memory/4008-0-0x0000000000860000-0x0000000000861000-memory.dmp

    Filesize

    4KB

  • memory/4008-57-0x0000000000860000-0x0000000000861000-memory.dmp

    Filesize

    4KB