Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 21:34
Static task
static1
Behavioral task
behavioral1
Sample
y4KuA3gUoq.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
y4KuA3gUoq.exe
Resource
win10v2004-20241007-en
General
-
Target
y4KuA3gUoq.exe
-
Size
9.3MB
-
MD5
f00cc3acb0edc971bfd70ccb98fc3701
-
SHA1
17f2a141768b85952140c4a2141cd18b8845844b
-
SHA256
15ab521e069455d069f96c79434d746dd110fa76b9b8367c9118ec6e23432dea
-
SHA512
03d95b2a0c75b826c77dddc3679929b422f505d53399f1a32f8016f1ff0a908a57dac492a7ee204045411523245cee0aa14f98f38f2aba56e01ffc054d691ab9
-
SSDEEP
98304:QOzH+XBts1rX50JU8qB+TciBavxGYfVtYzGbAnMklK/5Xo+IFoNngx1FRh4EO9lN:QOr+XwBqcgUt+MpmQNshJOsK7
Malware Config
Extracted
metasploit
metasploit_stager
0.0.0.0:0
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion y4KuA3gUoq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion y4KuA3gUoq.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1268 y4KuA3gUoq.exe 1268 y4KuA3gUoq.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1268 y4KuA3gUoq.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2884 1268 y4KuA3gUoq.exe 32 PID 1268 wrote to memory of 2884 1268 y4KuA3gUoq.exe 32 PID 1268 wrote to memory of 2884 1268 y4KuA3gUoq.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\y4KuA3gUoq.exe"C:\Users\Admin\AppData\Local\Temp\y4KuA3gUoq.exe"1⤵
- Checks BIOS information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1268 -s 5202⤵PID:2884
-