Analysis

  • max time kernel
    118s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 11:31

General

  • Target

    e67d387985a8f67c26617e565deca30d0f5f748bfe2641a1a1a0d3d2af2bf38c.exe

  • Size

    1.8MB

  • MD5

    789d6f366212cbfed66f17d8c5ddfdf5

  • SHA1

    4af75266f815629d268ba588f085e955182620ce

  • SHA256

    e67d387985a8f67c26617e565deca30d0f5f748bfe2641a1a1a0d3d2af2bf38c

  • SHA512

    0972a22c149d6b0c618ae20ff53c715d0a905b3d7c7499e4db0e199edf47e23eb05499ffc9f5b0a23d97b7ba71420471ffce4ba6308761cc11c814024bba49ad

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09HOGi9J3YiWdCMJ5QxmjwC/hR:/3d5ZQ1NxJIiW0MbQxA

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e67d387985a8f67c26617e565deca30d0f5f748bfe2641a1a1a0d3d2af2bf38c.exe
    "C:\Users\Admin\AppData\Local\Temp\e67d387985a8f67c26617e565deca30d0f5f748bfe2641a1a1a0d3d2af2bf38c.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\e67d387985a8f67c26617e565deca30d0f5f748bfe2641a1a1a0d3d2af2bf38c.exe
      "C:\Users\Admin\AppData\Local\Temp\e67d387985a8f67c26617e565deca30d0f5f748bfe2641a1a1a0d3d2af2bf38c.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c71748d89cd1b9e8440f028e2fc090c2

    SHA1

    e79fddfae343d6ee53910b677a734c72bf9a6e05

    SHA256

    7ad38638aba8c021d39b73adaf3537af81dea4172a65994fccf509172a24d270

    SHA512

    194ca397267f7ac8036ea8ccbb875676f974fcc6aaa2e2be5a394dbb78c81cd162e5afaa9d3c1d24c07167c1d99f78bbac1da032253aa1f72c38e2fa4bc90a08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    48236f140af572ec7842bd3893c56c5c

    SHA1

    bd13666f11630de0e697171a3f67377d26680bd5

    SHA256

    5d927386d35239f0cb69504c3f3e02487a7a93f5b8b36280593d92fb4fea7c7d

    SHA512

    18a583e19944ab0fa8f8138d860ce533a0a48549b0e055031417e2c5ba06304abeb0abd2eec8fd175ae66e4e2f0d18882f69aeafc9daafaf7eb087e42e07af9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    518a141cffa3be5a5821e25a4ce401fd

    SHA1

    08c4e405c5669425d08b0a760f2c8e82c659f812

    SHA256

    c4df2ff7f426d4ed41703b8ed13202f53c1d6656eac1608f54875e51e496953e

    SHA512

    c792679c00aaf2b596076b9c3a2f81752cb782fae5b3e1eb140b916fe2df2d03058921d8b5dca07c252d9deb9555bcba5ef4a35c027efe4bc663b638245c911d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    bfe60fe48cc485f7d720a325b72acc35

    SHA1

    da1f6f528c912f537410b066de9b3965c52e36fe

    SHA256

    58ea01d249ea5d4a419a6d2fc89fc0500348ee967c4ab10aeabdfc8ea592719a

    SHA512

    21f19cbff9159d8ece0afbd14e99c89279aa327f55fef17adf6faddefa3b21a9fb46de12563e19b514b0a2cfce7d91d5f9d7f8f29c86be91bc991ccf113a3e68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    5b593467f556bc7111b6a0ac96dd8da2

    SHA1

    3f7daa7f8870dd9e39ff7810a18ea16277882190

    SHA256

    be1913b9fd968d96b1e7eb92d38f8f95f2dd187cf5cdc52083ac1ea25ae13143

    SHA512

    4902a7b6c2c10036a626494221862fc241531449958b81c8db0ff4d76fe96c74c82708ae4e69863f504979bc57c3e8ec45ac1bb4e72d786ba95d7cdad8f24805

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a1e01b011c82e4d3f66ac154b685d8b7

    SHA1

    9e06037e87433f8041ea9045338dc036092838b6

    SHA256

    5717bdaad7135a7b08375a63bb0c407d18f28171c0289554cfe6304000464434

    SHA512

    66d6665b61f878f85ac0caf794c63198131f18108cccccc8e3d99087b875617e78bf9d2aa5749d7b50d1b554525e66bbf207800a233339ec8f3bcf2047a03f6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    db5ca803d3bab2c4b1cf3ca6ffb3ddc7

    SHA1

    19b9faaf2f79e745c958f533c6706ff1464c8be2

    SHA256

    a88d64f487e7834f0c158c4987282e719c3bb59a532892f059847f96b385f47c

    SHA512

    0483ec6b8d98e8a9e912ba766e6f6048517b94b367eaa42905eae327a3e0c359e48c7f5a670f7307ae6dfa6e5a02c605537acd5c97e7561657c066d70747d0d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    da43c4eb29dccbdb2f564a0251ca81a6

    SHA1

    101449c05a9d83e60fcb87e6f6613bf6f93d2f00

    SHA256

    401cd53a1d679b97ce3cdb69f0a2073799be96252b5fbfc3e01f6a04525139f3

    SHA512

    1e927a1fedcb7927c2ee19cae237fe36a3c8ff0d3be7b0d13dc28008ec18d8040c0899b527dada702031888b4f4dd16464c0cc9519399d25b6a9934ad8a1d025

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    ab77ff65f755db43f261d834ef5d3aa5

    SHA1

    ccf191de60c72a43745f1afb9cf82968e27ee9e0

    SHA256

    2f163900f3709960028e896458e0936004bd567ac07c57af66b3b2a64a4ccb04

    SHA512

    8f3686c00059e4434ab7b5c46d8daa965492794a8bf2006473f6e6c61dde1c7aa267b2d6fed84f150277ab818dff04abd620cc3b9dc60bb813700793a7d93e76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    888347baf70e391faa4fe04c805d29cc

    SHA1

    de94f687e299170e0c2d031d6cb372c97e6cf7cc

    SHA256

    ad7c3ad8a713186451e11c2e6a653d7d7b9b8f8c8162f80ce027f0c9a37c0513

    SHA512

    fb2c2f2e2538d2605142b5ac6bff911fa451bfe241e9b207e8deacd7e6d924458fb74b91d080b33da28273c96cab71be9ca94e88020e6a15986344d0ee1d89fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    843e602bd6a4e53adb678cd5634de79d

    SHA1

    c2f69839aee9f63e08cd67f458645bff8e7eccef

    SHA256

    8af37f90a9e986cad1da8af7d149b7f542b51dbec211d658b34f97ad911e233e

    SHA512

    6072e8ff584ae68c8eee6ec4d737c9d90fad2736a8d69e4916ab1e774e86f497076b9585b72dfcfb978eca5f0639b80b48c72359580991d8e83a7d3672b044ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9ab7f573ba1cecb4ab224bcee282f956

    SHA1

    2e2a179035169c4bb4b285c056c6d5c660b86f6f

    SHA256

    73ce259fe304dc6bac6c82c443405ae0d381caf8d69ec98f2cb2b9f7b62c0447

    SHA512

    af6395b71e8bb1c4726c6d79a907e8b2d32431b0b8b51302679cb5bff6d22a95d4b260adf0c3559686f38b4d01885468c9803218e3af07dde6d6a8c9dbaa89c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3cc0cbed9a77a57804ebb6592acdce92

    SHA1

    874063bf01562a797e65bac055df96609c421c3d

    SHA256

    beff3274041007ef48e4d0d3e244c7f8c452172287374bc2498bab8711799265

    SHA512

    2143fc3c837a0bc0019c672b0aac4b04f826aeb2f00855a4c281a9d63c3c54fa96cdc3dc8c36f1e8ba4ec122a9c310666870ddda091d691c0ca16f5e097f550f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    0c716a832d7bee7716d79f500e444a6d

    SHA1

    6f5e2029f836247508769b3f7a6f4f900a28cbc0

    SHA256

    26fc171fb56369904fd9161748d5bd8d7f13805eb95ea3f9f0fda6cb7ef1bad9

    SHA512

    0fb790d393ee0903449dd2f44f5a24ba08305efe769f1431b82eb78395d37078659037a54078e95b3891285b7ab8a3a2bc52f97e03be475a136f1c720118d117

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3bf64aa9979df4559c66f0c274b341d0

    SHA1

    e71ef4a17ee8d49ef2bdbae843e9606c9488653f

    SHA256

    d627be54baf361b914625194a968b48f4028eae7a97cd5bb3be5e4f941ef6df7

    SHA512

    2ac0320fcab5f5a300f1aefe42542c70aea42e8611f74d56743c11a56dea313fad23c1171485abb0ef3c2acf4cf19a59c097f252093d5ab9dbddf3ea87d0b6ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a5b74053f7db1089c508341d0e7f5bb3

    SHA1

    c472a441d7b9f1383251adc58337baa85a9fe597

    SHA256

    639d183cc47573cc3f69003f7a65691cfca855f0031f9f9a693365514074e611

    SHA512

    0f579ae675470ea79731d3755c0a7d4bb8609552fead983e053d4f7988cdbffb8a2f391f4eecc01497df94c9fe14b4b71c0786267ecb0928f00448dd52172ff4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3e931ebcfb3f2bbd891f2544a819a379

    SHA1

    3d91a59fd1ef7f5542dc15811fa07b1ea15d4ffd

    SHA256

    49cb7e94e73da5008049679a753835189756fa0635f2c70525e859583401cc14

    SHA512

    494795d65da06d5ffc02c9667d06d1c62d5ff1bc0f33e3294d3534ac69e114393d05778f4cfdd8568114b2c695dc660ca26239a652c4a0564ddcabb77f77237f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    73aa9897f159f16e41b9a2efebffba8d

    SHA1

    837c8af10b33737f6e1c9b34f67f1ed61fe10339

    SHA256

    9a3bad852b5cbef32ad23ca022aa01b90ccdff0545d5b6218fdd25cc3ad7b164

    SHA512

    626b302bcbb671426b6dc297250421d619a8dc28991f38eff8fb628dd7ebc543c675fdc939017c9f801cc93195af6f7c61d7c05b8656ab690bee531fa3094108

  • C:\Users\Admin\AppData\Local\Temp\Cab3E9.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar4CC.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/1712-1-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB

  • memory/1712-0-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB

  • memory/1712-2-0x0000000000280000-0x0000000000281000-memory.dmp
    Filesize

    4KB

  • memory/1712-4-0x0000000000400000-0x00000000005E5000-memory.dmp
    Filesize

    1.9MB

  • memory/3068-6-0x0000000000230000-0x0000000000231000-memory.dmp
    Filesize

    4KB

  • memory/3068-9-0x0000000000400000-0x00000000005E5000-memory.dmp
    Filesize

    1.9MB

  • memory/3068-11-0x0000000000400000-0x00000000005E5000-memory.dmp
    Filesize

    1.9MB