Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/11/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
9ff1808058d0d7f98dbb52ae548e9fdc7343e99bace5c742850d1a7aaba943b3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9ff1808058d0d7f98dbb52ae548e9fdc7343e99bace5c742850d1a7aaba943b3.exe
Resource
win10v2004-20241007-en
General
-
Target
9ff1808058d0d7f98dbb52ae548e9fdc7343e99bace5c742850d1a7aaba943b3.exe
-
Size
1.1MB
-
MD5
e15851877969e07ec3a9262ea71de051
-
SHA1
2e1fddbf86a95a29c2480d4194be5f70e1723381
-
SHA256
9ff1808058d0d7f98dbb52ae548e9fdc7343e99bace5c742850d1a7aaba943b3
-
SHA512
182c9665dcc09b96d76e3c028280f9cf44bbf8673f7e051c4c3f42fdccf1fde9efa0753c8f4ad9c209006de4b1e63af0ff7a9fc893e1dbbb2a3450eaa400c704
-
SSDEEP
24576:GtH5sAdXEIFkj249qVgvFACJzsQ9Ss4fhK5muxGYpgjTAXouhWhsZ:AdKv9qkGKzssJ4fhKocOjTA4u6A
Malware Config
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Metasploit payload 1 IoCs
resource yara_rule behavioral1/files/0x000e00000001277d-7.dat family_metasploit -
Requests dangerous framework permissions 15 IoCs
description ioc Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE Allows an application to send SMS messages. android.permission.SEND_SMS Allows an application to receive SMS messages. android.permission.RECEIVE_SMS Allows an application to record audio. android.permission.RECORD_AUDIO Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE Allows an application to read the user's contacts data. android.permission.READ_CONTACTS Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS Required to be able to access the camera device. android.permission.CAMERA Allows an application to read SMS messages. android.permission.READ_SMS Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows an application to read the user's call log. android.permission.READ_CALL_LOG Allows an application to write and read the user's call log data. android.permission.WRITE_CALL_LOG -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ff1808058d0d7f98dbb52ae548e9fdc7343e99bace5c742850d1a7aaba943b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2736 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2128 DllHost.exe 2128 DllHost.exe 2736 AcroRd32.exe 2736 AcroRd32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2868 2396 9ff1808058d0d7f98dbb52ae548e9fdc7343e99bace5c742850d1a7aaba943b3.exe 31 PID 2396 wrote to memory of 2868 2396 9ff1808058d0d7f98dbb52ae548e9fdc7343e99bace5c742850d1a7aaba943b3.exe 31 PID 2396 wrote to memory of 2868 2396 9ff1808058d0d7f98dbb52ae548e9fdc7343e99bace5c742850d1a7aaba943b3.exe 31 PID 2396 wrote to memory of 2868 2396 9ff1808058d0d7f98dbb52ae548e9fdc7343e99bace5c742850d1a7aaba943b3.exe 31 PID 2396 wrote to memory of 2868 2396 9ff1808058d0d7f98dbb52ae548e9fdc7343e99bace5c742850d1a7aaba943b3.exe 31 PID 2396 wrote to memory of 2868 2396 9ff1808058d0d7f98dbb52ae548e9fdc7343e99bace5c742850d1a7aaba943b3.exe 31 PID 2396 wrote to memory of 2868 2396 9ff1808058d0d7f98dbb52ae548e9fdc7343e99bace5c742850d1a7aaba943b3.exe 31 PID 2868 wrote to memory of 2736 2868 rundll32.exe 33 PID 2868 wrote to memory of 2736 2868 rundll32.exe 33 PID 2868 wrote to memory of 2736 2868 rundll32.exe 33 PID 2868 wrote to memory of 2736 2868 rundll32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ff1808058d0d7f98dbb52ae548e9fdc7343e99bace5c742850d1a7aaba943b3.exe"C:\Users\Admin\AppData\Local\Temp\9ff1808058d0d7f98dbb52ae548e9fdc7343e99bace5c742850d1a7aaba943b3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\BD1001.APK2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\BD1001.APK"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2736
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD599d7c2676a485078410f4654c2613733
SHA1ccbd757507a3a7098781f32fcbf0b4cadc49a48c
SHA256faabb5c09940e54d1916e0c18ca1598d03eae61d61d0e5cf66d3ae46eeb4203d
SHA512c1d66f8d201c883dea9fc625e0effa0a8ffc601c0e20d985933f86c71d7b15eb30722f05cc0f6e54c7c56ebd48689cc807571b52b779a92f3293412bf04511c1
-
Filesize
813KB
MD5d40a84d2ef4a2587cd92015bba40f58c
SHA11909be8fff24cf1b9894f5fcf88082573fa93142
SHA256c2a570743c33f9d5dc49a9986a180c19c8896399e84c0101bb4d8bf4042f8ab0
SHA5128bf4a2f9104739a9e0fe03b7466269815f249dfe89b4906d09ab8ef4e35e02d09abad455776ea0cfe00cabd90f817c6bdcfa74f4f90a0be49b86c92f077d4f7d
-
Filesize
3KB
MD5a5707392836b63c37e3ee112c554055a
SHA1cc69340fec039832cee8b993946ac4deb529e307
SHA2567310481274c8f0f66a8369d52899e24e59a0a61a05a41b66775ab3a05a097b13
SHA5128b3b2418bdc8182095d80cd500bb86bbaa42d70d2b2bb07ca31ef78bd4c9257cb3c85f49c1042ae333d8783097fdbd6d247a9199089d441cddf021fdd882a7a7