Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe
Resource
win10v2004-20241007-en
General
-
Target
433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe
-
Size
723KB
-
MD5
bae1382ebc9b5bfa167c1f27a2de9a50
-
SHA1
fffba10e15287bab45038f2698c260bef7574674
-
SHA256
433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1
-
SHA512
61eeb9459add2df90bb50ba91497bdf750abcab569b8502852d4b3211d187f15b9fc8aa18b1f40e44ec5bc62ab2ebb2ffd46febe8642a7e7ad7dbcbb20ac6cba
-
SSDEEP
12288:9Vt+vOLEZ1kxCNYyJElzxRs0uZz5LVI7Tua9dVo4t4qM20Gq7ADHfaZZkz:9+v7kKqXTua9dVjt0CHeQ
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
10.17.65.78:1024
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2836 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe 30 PID 3040 wrote to memory of 2836 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe 30 PID 3040 wrote to memory of 2836 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe 30 PID 3040 wrote to memory of 2836 3040 433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe"C:\Users\Admin\AppData\Local\Temp\433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Delete /TN "EVKey - Vietnamese Keyboard" /F2⤵
- System Location Discovery: System Language Discovery
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
652B
MD5923d1830f97cc9c5367cfdea115d2b0d
SHA1a13584dab18d0b1d56ca241395d6b93071f6c785
SHA2567dcf9508ce65c31607f1ad282bdfeb640ee4b4519ab2014c1ad31e8b787f843a
SHA51273d326ae30c801e2f12a2ca61e079d675613289cc815a82ff4bbc958a6193b08791e941738208f0013a1835580c0446d1795999078959f5888338cebb8fb03f2