Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 07:51
Static task
static1
Behavioral task
behavioral1
Sample
096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe
Resource
win10v2004-20240802-en
General
-
Target
096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe
-
Size
4.0MB
-
MD5
73f86717725bdb7c72c04f47191f155b
-
SHA1
52baad3486c9b5e04aa4e07eeec8ff67c861d65b
-
SHA256
096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31
-
SHA512
e54c85a61e0a2d98ef0488690f4da23ec98cdb51dae4752982a28ff512f4dfe05a4c692e75d11ce0aaa9e4a1412d22562b527eaf0ea9d1f5c7ed43405ff83155
-
SSDEEP
49152:i1ZXtxDOmWP0pVfuFt37RW9/9pSTQSpItLc8a2n7s+TTCP0VXbpX5Sl35mjAYRGo:atxKmWMs3RW9o4P7hTbM
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.5.9:6789
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags 096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings 096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3784 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4008 096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe 4008 096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLoadDriverPrivilege 4008 096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe Token: SeLoadDriverPrivilege 4008 096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4008 096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe 4008 096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4008 wrote to memory of 3784 4008 096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe 82 PID 4008 wrote to memory of 3784 4008 096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe 82 PID 4008 wrote to memory of 3784 4008 096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe"C:\Users\Admin\AppData\Local\Temp\096024b0cf6ebcbad059c030d43d76451c1a184a2c1f7680f3976718d198de31.exe"1⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Windows\temp\cpuz_driver_4008.log2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:3784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bf44aaef1b58aca9067fdb8294235484
SHA12da88020408668e8d86236dfbb514583c2a98499
SHA256b9728dfec703d7fdf2a2953f006477857daad814f3683c94c9a7175227c38745
SHA512e14f0f378d2165495195f2395a6aee5d55d2bff62874de107009673716458418b4232e0c3085c5c2e64bff9701cceea2f497bbf7de6e41a17fda58ddbaebed05
-
Filesize
2KB
MD5d7c463fce8e91f67105b3a3afac8a24e
SHA1e4b3983087dcaa7f44eac206fa84f9faf5d99b32
SHA25644ddf97f159ecc717f54b9ce5d0aa9e701091d141e18fe491e457c61cbad654a
SHA5123f72525300eb3d985c4dc1206af4645eca51cf57a58385d5a2a484e20abf1ecd49e9ab776797ee57b348af8044827d32ac872d649a46e1bb83465c4f56a96d84
-
Filesize
1KB
MD535ea302e34ca04d7c312f0c2c5acfa3d
SHA1cef5bae5f1c8745103872671c8c0f7e249854c2f
SHA256fce8b208a890659269b25b85681fc09f7b17e55becb21b33a8a70097b9cca1f9
SHA5128513be445263a114b107a3a8961c7963e2ff3a1f21d21b5718dec9eedf717aaa23cb43315a066b2b6344755e713587016e26dbcff3254292dcd41e62375817ef
-
Filesize
2KB
MD55193c93dc66c1541534f86c0a868e538
SHA1e05d751722e328ea6913e018b5a60a8472a03151
SHA25690b3f9c7a8753dc7f8c25c96bcd26e00dea2ad1e9ff7157bd2ce74ef0f6da55a
SHA51264bae67491ec0a794348a948e2ac721af923cee68e5ff0bdb842868782e825cdd05b084b1d200341d50a1b6d29440410e31bf641634a5ce15f50cc0d2fcd2b25