Analysis
-
max time kernel
119s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 21:56
Static task
static1
Behavioral task
behavioral1
Sample
90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe
Resource
win10v2004-20241007-en
General
-
Target
90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe
-
Size
140KB
-
MD5
ecf1dccb831f5d9f64e12e69cb04be74
-
SHA1
c448fe8792bb8b3155f0f4fc360d3053155a64c5
-
SHA256
90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377
-
SHA512
d81cb71368738815dba2a8a14e1ce36a9f4251e97cbc177ea8ece1629fc44efe17a20e2f6c18b570f1638821a39a6ea5ee95a54f633701345fe585770d340770
-
SSDEEP
3072:Cp651xEpsy1ai+6oTHzoMYypJTy4RhgVbYLr8imVO:lEb19/oTHzoMYynTy4C4hm8
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List igfxvm32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxvm32.exe = "C:\\Windows\\SysWOW64\\igfxvm32.exe:*:Enabled:Intel Virtual Machine" igfxvm32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List igfxvm32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxvm32.exe = "C:\\Windows\\SysWOW64\\igfxvm32.exe:*:Enabled:Intel Virtual Machine" igfxvm32.exe -
Deletes itself 1 IoCs
pid Process 2716 igfxvm32.exe -
Executes dropped EXE 2 IoCs
pid Process 2444 igfxvm32.exe 2716 igfxvm32.exe -
Loads dropped DLL 3 IoCs
pid Process 2412 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe 2412 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe 2444 igfxvm32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Intel Virtual Machine = "C:\\Windows\\SysWOW64\\igfxvm32.exe" igfxvm32.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxvm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxvm32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe File opened for modification C:\Windows\SysWOW64\igfxvm32.exe 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe File created C:\Windows\SysWOW64\igfxvm32.exe 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe File opened for modification C:\Windows\SysWOW64\ igfxvm32.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2380 set thread context of 2412 2380 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe 30 PID 2444 set thread context of 2716 2444 igfxvm32.exe 32 -
resource yara_rule behavioral1/memory/2412-4-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2412-9-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2412-10-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2412-8-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2412-2-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2412-7-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2412-5-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2412-35-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2412-39-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2716-36-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2716-40-0x0000000000400000-0x000000000044C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxvm32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2412 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe 2412 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe 2716 igfxvm32.exe 2716 igfxvm32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2412 2380 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe 30 PID 2380 wrote to memory of 2412 2380 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe 30 PID 2380 wrote to memory of 2412 2380 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe 30 PID 2380 wrote to memory of 2412 2380 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe 30 PID 2380 wrote to memory of 2412 2380 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe 30 PID 2380 wrote to memory of 2412 2380 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe 30 PID 2380 wrote to memory of 2412 2380 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe 30 PID 2412 wrote to memory of 2444 2412 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe 31 PID 2412 wrote to memory of 2444 2412 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe 31 PID 2412 wrote to memory of 2444 2412 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe 31 PID 2412 wrote to memory of 2444 2412 90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe 31 PID 2444 wrote to memory of 2716 2444 igfxvm32.exe 32 PID 2444 wrote to memory of 2716 2444 igfxvm32.exe 32 PID 2444 wrote to memory of 2716 2444 igfxvm32.exe 32 PID 2444 wrote to memory of 2716 2444 igfxvm32.exe 32 PID 2444 wrote to memory of 2716 2444 igfxvm32.exe 32 PID 2444 wrote to memory of 2716 2444 igfxvm32.exe 32 PID 2444 wrote to memory of 2716 2444 igfxvm32.exe 32 PID 2716 wrote to memory of 1200 2716 igfxvm32.exe 21 PID 2716 wrote to memory of 1200 2716 igfxvm32.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe"C:\Users\Admin\AppData\Local\Temp\90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe"C:\Users\Admin\AppData\Local\Temp\90598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377.exe"3⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\igfxvm32.exe"C:\Windows\SysWOW64\igfxvm32.exe" C:\Users\Admin\AppData\Local\Temp\90598B~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\igfxvm32.exe"C:\Windows\SysWOW64\igfxvm32.exe" C:\Users\Admin\AppData\Local\Temp\90598B~1.EXE5⤵
- Modifies firewall policy service
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2716
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5ecf1dccb831f5d9f64e12e69cb04be74
SHA1c448fe8792bb8b3155f0f4fc360d3053155a64c5
SHA25690598bd93b43453acaa3d435d29f483c088752e5d457d7a9bcff49a39e41c377
SHA512d81cb71368738815dba2a8a14e1ce36a9f4251e97cbc177ea8ece1629fc44efe17a20e2f6c18b570f1638821a39a6ea5ee95a54f633701345fe585770d340770