Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-08-2022 06:42

General

  • Target

    http://212.83.163.95:7777

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

212.83.163.95:7777

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://212.83.163.95:7777
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4940
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4940 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4996
    • C:\Users\Admin\Downloads\c.exe
      "C:\Users\Admin\Downloads\c.exe"
      2⤵
      • Executes dropped EXE
      PID:4596
    • C:\Users\Admin\Downloads\sysdvx.exe
      "C:\Users\Admin\Downloads\sysdvx.exe"
      2⤵
      • Executes dropped EXE
      PID:5048

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Downloads\c.exe
    Filesize

    72KB

    MD5

    148e93aa23ccd06a56e308743d3e46fa

    SHA1

    565b7e2935c11ac1780d4b0a2afd0b15f62d7ffd

    SHA256

    9f45d0617825b8b60672eb57351a73ae09f1e9d0a966bc82d95a82bd4a3c2dfd

    SHA512

    7a9129c43a559734e6948b33add728ae262d1b4b22bc1cfce104560e338fdecac83b394b3c118e32247f338d6dee80fa0ef37a4176dc31667745157e309a1354

  • C:\Users\Admin\Downloads\c.exe.ircb4vl.partial
    Filesize

    72KB

    MD5

    148e93aa23ccd06a56e308743d3e46fa

    SHA1

    565b7e2935c11ac1780d4b0a2afd0b15f62d7ffd

    SHA256

    9f45d0617825b8b60672eb57351a73ae09f1e9d0a966bc82d95a82bd4a3c2dfd

    SHA512

    7a9129c43a559734e6948b33add728ae262d1b4b22bc1cfce104560e338fdecac83b394b3c118e32247f338d6dee80fa0ef37a4176dc31667745157e309a1354

  • C:\Users\Admin\Downloads\sysdvx.exe
    Filesize

    573KB

    MD5

    0554bb64f82b5627c462e93bc429ff4d

    SHA1

    653de64978dcca54d5ee89a9662390fdc14e91f7

    SHA256

    eb580a26823d80a1777d9f9f10ca3e13b74c676c0f867835ad39d137c01027f1

    SHA512

    1af7c18fb8bc52cc83fa17a3b1d2102739a78e931ea0035624aa78b5a7cb913cc41b5de76c6410e4440ded842bd7bd953966ce880dc5335ca23b1a91d1014201

  • C:\Users\Admin\Downloads\sysdvx.exe.o13szxq.partial
    Filesize

    573KB

    MD5

    0554bb64f82b5627c462e93bc429ff4d

    SHA1

    653de64978dcca54d5ee89a9662390fdc14e91f7

    SHA256

    eb580a26823d80a1777d9f9f10ca3e13b74c676c0f867835ad39d137c01027f1

    SHA512

    1af7c18fb8bc52cc83fa17a3b1d2102739a78e931ea0035624aa78b5a7cb913cc41b5de76c6410e4440ded842bd7bd953966ce880dc5335ca23b1a91d1014201

  • memory/4596-133-0x0000000000000000-mapping.dmp
  • memory/5048-136-0x0000000000000000-mapping.dmp
  • memory/5048-138-0x0000000000400000-0x0000000000497000-memory.dmp
    Filesize

    604KB

  • memory/5048-139-0x0000000000400000-0x0000000000497000-memory.dmp
    Filesize

    604KB