Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18-04-2024 00:59

General

  • Target

    be5a48fc4d92a5a26da69b562795456d9ef90ec723b4105c4b1ede5b57cb29e6.exe

  • Size

    1.8MB

  • MD5

    4414d2ea457ca79b4734f4d03aa10cff

  • SHA1

    be055cc414a6559eb0b8f6c61aa643ffc3a042fb

  • SHA256

    be5a48fc4d92a5a26da69b562795456d9ef90ec723b4105c4b1ede5b57cb29e6

  • SHA512

    c98808a4e483e2d2401c8dbae6cd62c321e993c85cfa406d4ddc56cef804693bcac8b8dd683f96917084f4eefa61b500c5d983b66f6b0e3c3b11585b28226172

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09SOGi9J3YiWdCMJ5QxmjwC/hR:/3d5ZQ1exJIiW0MbQxA

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be5a48fc4d92a5a26da69b562795456d9ef90ec723b4105c4b1ede5b57cb29e6.exe
    "C:\Users\Admin\AppData\Local\Temp\be5a48fc4d92a5a26da69b562795456d9ef90ec723b4105c4b1ede5b57cb29e6.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Users\Admin\AppData\Local\Temp\be5a48fc4d92a5a26da69b562795456d9ef90ec723b4105c4b1ede5b57cb29e6.exe
      "C:\Users\Admin\AppData\Local\Temp\be5a48fc4d92a5a26da69b562795456d9ef90ec723b4105c4b1ede5b57cb29e6.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2780
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1016

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3b7eafae31902334388569a6b932b49e

    SHA1

    7e754d3aacfc758bba3261bbf74c21effcb62df0

    SHA256

    fea0647102a159531b0bd0310803f59b8ccbca9e3f5453d2f72f6dc3238b5896

    SHA512

    20704aa2f2ad94dcbbc9608a83720105d95ddd127f31e4a290fa85892be6556ad263face784a6243a4df0bd8d8ecadb8b2b63fadab1b83498e1411fdb4eef3d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    416d2270de2ab51123679f611bae71c4

    SHA1

    eb0865dc77fdc7dd086e80456c5da7bb9efefcd2

    SHA256

    77be02437a815704630b8159f3013688ff8b3b6749cbdcdb49d67e1611030d90

    SHA512

    b302236d190cc78ce7e1279219ddffd6f0c6893bc71b2eb436d1b9d980d4953b053c79e2125d5fe2a40c42f4f7da68d15fe76a6df961701fca20ee13d19abe66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f58de71b78828a40f6a815878d344f60

    SHA1

    91e5dee74243384aa73db52944cf1c5edfadbfea

    SHA256

    37d371966ae1a767bc82e292590790d54606a3dfae2d01294e7da3bfa0d196e7

    SHA512

    62e980ad22af39c848f358e539e8d87ec3d4550ecb91cb06955fd09afd4940b280fe7aca3d142fd491f425bad169fc1c54ab223ce2dce7b5a96b181ffca21781

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f516d0c4f92d2d6e46224640d263f629

    SHA1

    f5cf20fccf3ce826463d7196ac6195d129adeea3

    SHA256

    5492d179ad062d0f020347a936b46dcae3b2c17710492d30fe206a793e0a8d8c

    SHA512

    11a47411871f01ae17ccee44167fe66284cde59b35e9de3c89228e5e2b92a1c9d046dc2866e4935c34c074e1dd345f8fbbe20f9360d6ef4d210204f024a88c80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    04bf089756988114d9dbadb0367e5ec6

    SHA1

    1465064872f7ce05447784f4eedc8d2b2ddf9b31

    SHA256

    95acaeb905da392879ab6c8257dcf4913a3a577a0b51a341a98447163bb14d77

    SHA512

    ff7d11c5bafe75c19675142b56527b9621a9b7f4bcf39a54413aea140ebd47edc512261685663bd564f738c1d458d3cb7c532ed4c42755958086cd2d743c00d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2f0048eff1e695ba213b4b3b5aa99e7b

    SHA1

    2050bf657b73e06a9ffdf0d456ffd085e380e794

    SHA256

    9334ee2dbf813109085729c674a077eb3adb72c1b483c384bed45b2419335775

    SHA512

    797c18653d63a75b97306ecfe03056c630a70258055e50ff0da7de831740496985a770ebf1689f973464f30475975a2af86a22278d6b0ed25397c7156dd92399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    11ca2c83e9ac91f7cd47e43dd0fdf912

    SHA1

    571a3316aae99522f27443f660d2809f267c962d

    SHA256

    d81dd8a52ff90db0f9754c72f184edb4886d398022f44292a2f5871255e8f6b2

    SHA512

    dc227e8dd1bb9a1a8b56422d574f23a470873d3841a5015fc0b4c2a5a63329d0a90020b75b34902bf8ff9c3e57e1b8de62266af84769843d902f7f0c7a808cf0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6f13c0b96d4fd59d8e160e6f014b8bc1

    SHA1

    df46d772785ddfe9299f7eec45e8e4f120ee2c32

    SHA256

    ecd62bb51813d34423e2ea0eece909ed6a33e824eb8f7a200d02bc43f9d28d24

    SHA512

    c736a0e97c719feca047edae5eaf73de8cd92d158f275f361de81f93c19b76102360607caecabce6e74846325071a19a780c36c4bbb16c0bd7f01a649c1e9b20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2c2c0ced4f5fa1de442b224986a03010

    SHA1

    cde8905e9a02924d6dad6b4f9555a3af27095ada

    SHA256

    4ed525f0ef46d7f3365ff821a36290c1396f00e11dd96e9f71ed3caed7245bc5

    SHA512

    a7b0f281d5d4aff93e1039cf52e9f49f23a1b1cf89ab84eec9bc3bc1dfbd1f7bb73b8dc4ebb027c1f7e7626ed6c87578cd45f853db0775e3538d60b8ccbf9480

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8a4bc994b07dd27721ae3c0540a849c7

    SHA1

    e204ba4c3e227bcc61382c5ab0e26e965e57a018

    SHA256

    f613ceb0ee03327c3cb575466db981de7155353493db9c761d48980d05ae70b9

    SHA512

    0bc2519bf09e2f9bdc347519c6347ad13488881f7532500ff96317f703bcc8ca68cf44e27d5a006d0f9ef4167341bccaff036226377e72c82267ae2a8793e606

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1e0266e2436e836c59d785d949cb5273

    SHA1

    5c293283a51a8a83028ac23967ecaa95bc0f38cd

    SHA256

    7893911b4acb74842c0f3e1b769d16bb03cb27b3ec5064611ffacd25c1f2e7c0

    SHA512

    48aac921b6fd4a0e29ac44c829ad99a7379c26630b03b632386568358a9a20ba212429c607a73d6465adf1f5aac3c4210ce565abcdbb979edaad1d6778e97910

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    32d318487e395b83194b529002f21e38

    SHA1

    fd6efd23f49c7ca84b323622221600bff1993def

    SHA256

    dca2b288f94f3244fb6a2bf46a2b75d287d65644d2635c3a84f16768ffb111d2

    SHA512

    2c582c508f61e0025cfc9dfc02ae00da7a8fb8e1c98e13b0e2075f8ccd84aacf8a91a749193d3882bc9fe23672304294e15743a1224f47f33066ef5f58a664f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c8e84bf6d6a9a43f5c555f861ae84390

    SHA1

    aa73c2d4007e69703a67e4398a2a48ea24b7d258

    SHA256

    10473e5843432d21e857e7c4816978861f7154e47edcfe175c49ab2b3789d77b

    SHA512

    d24a87c56b315e2e2831c5de7b552bd8fb4a66cd2a8030e133b965bcbf27aa7877fb936575ef9cb570035aa3cb3ffb2dd4be54469bef7cd19e4af7b46af82a5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    faef285c8c4c2d0a64e3d38eca9cc31c

    SHA1

    541e18b3ee7dce943b114e87363b15fdf331671e

    SHA256

    6ed480ea38014dc4f3ffc16f508531047ccf1b0e726a3673bba278815e524164

    SHA512

    3631b6dc18e07c135ecfebec25556e4416af8937c02cdccee22b188e18bb67f7fad8ca2737507ae8e3fd6fa52071de39de47fc297f6948e6ab8309518cd1667f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9502c2ef1a0785885c05ab839e59906b

    SHA1

    7178cb1ee0dfdf8bc8d50f8169dd130b55e5fb48

    SHA256

    7d726ee7a673fa388c3cc4e251ebac0d63899d6a3784d42ee806205907b25e11

    SHA512

    9cddb746fcc8e7365d229f4eef89978b123114038d1e575f13395762a18656a0b87a5b8d2b7a748ff5670a7d68f3b7852de9bceab069fadefa9b0f25276a29b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    99c1cc84c7b814e462461276cbd7b70b

    SHA1

    8ec6109f4c0e9894fb1fda111c39c71e5d3d5c6a

    SHA256

    3ec29dce36b79a2440484986d916c31f1607c41e22ef29f48ef7665854cf2353

    SHA512

    b3315ee2bc262a0ac7ca78158d8eb571beb00567a6cf72e45ac29885b81f5cfce57cdd1af8ce942717430887a91fc5c4e5582f89f6bec2a1c843f59092231438

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    010bf0f7a207444405a0d63dd6b6129b

    SHA1

    93a99dfb55570017e509110f575672a30190bfb3

    SHA256

    b743b483ab70661037d8e990364ed8cc35a67d7939b0af4a1fadc60c7197ba0c

    SHA512

    4ba4d718e8ae4babcc5ba6e5003629cef5a403f0f2da5889f87b8190c8ae6dcdfdd8bc19bacf311faa12d989e830a962b0bfdf35ad49e9373487a587fe174970

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    24d94ffca729ea96935c11b3341750b6

    SHA1

    6943295bc285e9e2537930450de49c79953c48ac

    SHA256

    146953c899a8c9adad048ab9accf74a8d512d241f2654d9c9f5492a33433632e

    SHA512

    da91366e650c446828137ae3754ee688360c5f90a302e5d652fc02df9adbbb9c4f593b6ecf22f916006377aba388add43ab7a95bfbe9233d275fd11c42ba9ef7

  • C:\Users\Admin\AppData\Local\Temp\CabD4BF.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarD60E.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2648-4-0x0000000000400000-0x00000000005E5000-memory.dmp
    Filesize

    1.9MB

  • memory/2648-0-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB

  • memory/2648-1-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB

  • memory/2648-2-0x0000000000230000-0x0000000000231000-memory.dmp
    Filesize

    4KB

  • memory/2996-6-0x00000000001C0000-0x00000000001C1000-memory.dmp
    Filesize

    4KB

  • memory/2996-9-0x0000000000400000-0x00000000005E5000-memory.dmp
    Filesize

    1.9MB

  • memory/2996-10-0x0000000000400000-0x00000000005E5000-memory.dmp
    Filesize

    1.9MB

  • memory/2996-12-0x0000000000400000-0x00000000005E5000-memory.dmp
    Filesize

    1.9MB