Analysis

  • max time kernel
    147s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 03:15

General

  • Target

    2f97a0fe99fdfe29ce4705a61f921e3e81b32102ad18e62e7e53b9ae4a826bd0.exe

  • Size

    1.8MB

  • MD5

    7f626f342cab056535136e4289416966

  • SHA1

    df414a319ecebf46b973a4c11cc589ef399d0128

  • SHA256

    2f97a0fe99fdfe29ce4705a61f921e3e81b32102ad18e62e7e53b9ae4a826bd0

  • SHA512

    c1a9b25486c30150046f5a1838e14246fc31d9d06a508cb78d69b0aa66951cb9bb1c56d54aaaf2ba500e7f80e62939b2764513c6fdc246e9e31e089ea243eeb3

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09sOGi9J3YiWdCMJ5QxmjwC/hR:/3d5ZQ1gxJIiW0MbQxA

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f97a0fe99fdfe29ce4705a61f921e3e81b32102ad18e62e7e53b9ae4a826bd0.exe
    "C:\Users\Admin\AppData\Local\Temp\2f97a0fe99fdfe29ce4705a61f921e3e81b32102ad18e62e7e53b9ae4a826bd0.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\2f97a0fe99fdfe29ce4705a61f921e3e81b32102ad18e62e7e53b9ae4a826bd0.exe
      "C:\Users\Admin\AppData\Local\Temp\2f97a0fe99fdfe29ce4705a61f921e3e81b32102ad18e62e7e53b9ae4a826bd0.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2940
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2432

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    707e911e3db2c0a8b8440652ef974fc3

    SHA1

    f33e9f33b8700495050319f70b5b013933b22070

    SHA256

    3270f4660472458765d48f1f0f0811beca38c136b04757d626bc1e616f8181e5

    SHA512

    f28944b53c9fc3196c1fdb16c729bef5f9471ca96293de9b8c4b7265cbc0dc596aa4fda5b9d8370bfad675adddfec7cd2de32a5e0d0df026ec09f92be3ceac65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    ee10ba448a67f399c40c5b4a779d2f33

    SHA1

    804ff8f865879e0e78800fe197cdfb2bb112a8eb

    SHA256

    982d89acc9dc9dee0db1395e3f0fffa7c230f9d6ec5773c8062da86b63937e98

    SHA512

    1e3c9ad3091dc8abe37b05fb11b5dbcd74db8e7821571960362b05490ec052068cf8cf7d7c57c9704a93e5955d4375df4d1bd87c673273cabcdd5c17148817e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    5821dc48f060d96e6fa441d3603cc40f

    SHA1

    8a7a2094e8feb3ed722332b4a29572f4bcde5859

    SHA256

    3db4bd114594fd847e9c438b356591acf22fe10aa80bcb8f6d2412b51301a539

    SHA512

    9019221718efa2a6f3a93b1469057d5793e88407a87742964a305824145c823216e59573ff6850a8da21de20c7cdf4289bf8e6338f27e996c9b3da6a4d9c90bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7db2201e64e31ba5b7df222836c381a2

    SHA1

    4fda1941acab9fa311fcfed8bb5e4ebcd72a2ca5

    SHA256

    3ad4d6926c481f86885bba6024c9f11b794f1efe9800859604df8a04fcc87aa1

    SHA512

    d2ae35e13956a350f1adcacc1d6009b648535727a6d807ecdc4c369f9a2f73122ebac1b3ce159ca4e98280482c8e616be13115fdec3692b8f9e3062491ef1400

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    cb25244d87de784312bee483d683e781

    SHA1

    cd6ac3f5c268279c14f331271f1b61399aec50b4

    SHA256

    287d35441d81fd0011fdf1b09748d65468d060674de67607be9d27242dfaf4dc

    SHA512

    68eafb1156727c220f7e85bd6d732d37cb862620f1be341f85beb70898be6557671f95d01cfbc48ec625ebbed99df4122b661f8f4f540e00d2f3119d5de28d82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    4cce74d0946d73115037ba20d9cdf9ea

    SHA1

    8cda12b608300ad56711b45de407f1ad8c17ddf1

    SHA256

    bdc737e0c2234c9ac89e92eecddaec1a9d7b85af0465935ae1a5a0c7fc0e4de6

    SHA512

    0c0c7d64acd1346c2b03ee14985da33f94ef9164d43a788103de22121618e4b236a664b32d4059c3d6e9c7d79dcf4a792eef4016b4aa91c09fffa012c441d5d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    eff07007a0cc884f37c4ecba6485a11e

    SHA1

    959e4fc9e231752f249649c8b006404577ef56ab

    SHA256

    1ac6f1463fa9bcec196be203772cb02d0f6dd9628f9f6f0016febea61f127d44

    SHA512

    3f533cd504a5bdd95ba5d32df95869bebec4a787e9ce57844b0c0c23f84b0dc501edb8253167ece4cc5eb3ece850db89cef3daea55a61f307c1bc500954d10a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    69a35b6b475e744e0d020fb54241384e

    SHA1

    0af3a9c025479af1abf24c7e25a09768269d1814

    SHA256

    a0a7ec7e9cc9704ac65319d46651e347083f8188145436337069a0c722f8aa5f

    SHA512

    cba4bc1f8774333620aa28a000cc5ba48a5829b0d4901fea3c3556af93d3e7c7767d2f08933691ad46a7084183ac805b63ebb8fcc7cb552ee9aff24c62c4c568

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8d32cb95e2f2c318ec6e6e68ef43c806

    SHA1

    08a7a87d8fbb907853f5f9675f12db2d14f96366

    SHA256

    d3e519d51e23775c04e734c206fddff77bd8abd31408db0d53cf0fdf232072f8

    SHA512

    622f628204e08223db22ab7808252ee51a89cb9a4e142f9a158ed3903d99c0f24093d78255516d0ad0da475e7f28634b1f89cb35f9edaf20ff78196251235ada

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e7e8afeb9f2465846059eea2db5d559e

    SHA1

    274aefaad2f160064f2c287ac7b61912ab8a1c5c

    SHA256

    7c56ca91efbc7028f31fda4a6e9c3a686a0f76bd5440325b60b1f85b25128a68

    SHA512

    4d92cfafd86df2149f29aa19af56f5d6f9093c501cc27a00f6ade00adf89813622e4870ac9272c4b30ef384e1401a5932f43a3d1515fbf89ba9a390a931fd451

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e9f98bc6b08600cadebf5088d35a93a7

    SHA1

    457d4aea53649f261d70f8e65e314ac5d9d501b8

    SHA256

    3cf75b15faedf15a2c7b98a7b6a55faaf6e09aecbce8483bf480d995ec264c77

    SHA512

    e8b3eb1437eac84884273a3a5890604945fac107e83fc8fbc256d3021edacc7946294f7332eaa873093a26c9d5f52ce37a1d4fc8e5ba4c469c0cb60c3409ee43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    585da69754579ec266a718f02b080c8c

    SHA1

    f9eae6ee665bcd0fcbe41416b8e820f81738490f

    SHA256

    d0092f775b3896083b59c6eb996766af8744ebc40f6661adbbe92318187d0a5c

    SHA512

    c7eeb34f9339c06adf59fe5cff7791ff7c0dffa7d604e0b92d72e400307575f0a55a243ed80dd8ee1fa15182d67c920eae5862b7d09e12822e6ed971ae04d77a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3ced1a38d3cf7509e61bd149e7902900

    SHA1

    674c2eacc6b181d94a9968488915b0a86171b686

    SHA256

    ae6a6625d9200679c7a5a470179aa2e974be3f00b814fbdd76755f3b60c532c8

    SHA512

    a3165097faba7c10f8e520335c485f233c3077863cb93db489a50a3bb01a85e13de29bd78f89f3b895c23090a5122b7c0e349196672ddb025b76b3142d8c7e6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b081088800dd3cc43491b42e8d9ab9eb

    SHA1

    5b579c09370581c3f8ce121db375578bc7c80631

    SHA256

    e513c9ad396b0216eef23c573524a77148b6d0fba8a3eb69479ca3dd9bd45f4d

    SHA512

    a9bba4598042fa9c323e44b1661d99323ccf3bfe3ff30ed65e6793630e8aea2058f48f1768d7c639292bf1a5d161aaee0b5aadd94ed05ac0f955c0458b8aa3c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    066c40603bd1b5a40e3b717d5f9aee18

    SHA1

    8aacb8d3c144e65493554df18681429135aafac2

    SHA256

    7c904bd345ec0ef02de14d63c7753e4f0c7664f45791ae851d2bc076cddf8840

    SHA512

    80733a65f4dadccc04342da8de60f4b7a0cdb90e7a02b6bd29a051434778e6e659669045387fa5b3b3534e3094079412e062227a31f567b8d4a5d1a51e3b6cb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1e28cc546e1d4af6e6c5f39d8147e0f8

    SHA1

    e8d29d2f65149a0105b48d7822c353c0c2002c5b

    SHA256

    54de0ca0eccf05d0c78c2f129dea43ba0e1c31af48084aa58f3040b023cf3d91

    SHA512

    ae8e948bbc75c725d96cbd5e7fac8911fd7ef1b24252af2468090850069ce4f7346e42f806c00877cc8f01610e69d28df051f7398675b47832e5eb7a6464559b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1d5703910823f75174343475d1e00c2a

    SHA1

    5bfdfa8b12b51dab271314e94056a288b24281b7

    SHA256

    56034168e7f41948a2887bf37f8dfe4f9b32ae7a31b45e793fb1fa9c2f5bc817

    SHA512

    3a2552973202cb41d8b23b81d8503d0b2062f0a762d6badf94ef56a77642a2ea058e8285e19934851d2680a7c02513f31961c2d6e358b72377ad4b38667b0f53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7f8205005a0791b12496c8586ce5f0b2

    SHA1

    c6bcf6015482dfd7e4a7c011bd874dc9146f7d12

    SHA256

    4523830babb6889fa3c4eac8e961e7a8bb931c7024a3a09ffcfbba765ce2dc2d

    SHA512

    ea3d0c124ae0bd98794ef43d9d10ed50c4a14ab20a9346a0513e92a53817846fcdbc308a8233f26a2829538814075468625a01be4759c8c9554b636fda5f73b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e591d4b31fbbdde25727d42ed7f5127f

    SHA1

    3ad1cdec9875e52aab66918a6acd9787a3a80a93

    SHA256

    22d6364eeb20cf79f1e5677b1a1da0efa1eda52dc68f2e6b477bc8f7adafa533

    SHA512

    8be402c19627caf9da9395b5c3cf50aedf04149de366899eba6439aef9027926055740eb3a7feabd847de287cd2396e4bdfc0180ba8fc36502df93379a3581c6

  • C:\Users\Admin\AppData\Local\Temp\CabFCB9.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarFD8B.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2156-1-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB

  • memory/2156-0-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB

  • memory/2156-2-0x0000000000330000-0x0000000000331000-memory.dmp
    Filesize

    4KB

  • memory/2156-4-0x0000000000400000-0x00000000005E5000-memory.dmp
    Filesize

    1.9MB

  • memory/2172-6-0x0000000000290000-0x0000000000291000-memory.dmp
    Filesize

    4KB

  • memory/2172-9-0x0000000000400000-0x00000000005E5000-memory.dmp
    Filesize

    1.9MB

  • memory/2172-11-0x0000000000400000-0x00000000005E5000-memory.dmp
    Filesize

    1.9MB