Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-05-2024 04:34

General

  • Target

    reverse_tcp_uuid.msi

  • Size

    156KB

  • MD5

    ea86d9f4827f1b24baf14d0a62111c81

  • SHA1

    dfbe48a8b76917ff03cf74d0519dda2c1ab76dfb

  • SHA256

    1b678899247d6239f5c03b9f017b6808524d3a5e9320e31f78a355017323db48

  • SHA512

    ab86da16e79c4d000ec736528f7e58e5973f2ff9654c1bcb0ba9ef7ef1d14ce3134f5d0f31a5803da93a6676c0c3f35dee0559fe66dda60f16e0098e56ca0d10

  • SSDEEP

    384:iHpe4ZvJXK7gzFM7WuMOxceoXgZs+5BCq26yy3M5BCqPN:Zmxa7gBMyuvDCUyWMDC

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

1.14.247.162:40001

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\reverse_tcp_uuid.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3972
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1936
    • C:\Windows\Installer\MSI94BF.tmp
      "C:\Windows\Installer\MSI94BF.tmp"
      2⤵
      • Executes dropped EXE
      PID:2220
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 2EA01EBC43F48F7CB2DA08CFEB6B1DD3
      2⤵
        PID:3296
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:5056

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Installer\MSI94BF.tmp
      Filesize

      124KB

      MD5

      32bca63e32bfa7abf23e77edd30478d6

      SHA1

      57beba1d54428d559fd3ed8d258a691990cd0245

      SHA256

      c6b4471618c370d9216fc3632dc258ad460471e2385ded2f2929133e9b1e67ab

      SHA512

      3a0f987a78316728da4ee30ea307919a2b73c9b85c0cbe24e179f4c6bb6255d89fc056f1d3f9f56bd6ff6ad40e22521fc581f08630a8759bed9cc3892c81b553

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2
      Filesize

      23.7MB

      MD5

      2df9707a09d91b6b64e0d68a8c0f25b5

      SHA1

      c2159e49013da398ceaf44d2f8c58b7a43825f76

      SHA256

      cb5a67e6e2097df0b7d2500d9024960e448846b3a141f4af5bb30a8eaf4f28fb

      SHA512

      2bace93a116e96df546a4a06df3c9edc5f6948261c68fc1f420dc18a5070be96b248ce92d9bf15d516bf8923577b9c78366e0eb2a93dcb7b1976d11760991739

    • \??\Volume{b97e3c07-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{13c69b2e-ab28-42be-8ba8-6ab293908ebe}_OnDiskSnapshotProp
      Filesize

      6KB

      MD5

      0df33975e3eb22f2dbaf95d70e0784de

      SHA1

      7f90e892adbae73bc48d62c1ef7e0b33b11f3e70

      SHA256

      602d5ad4925735a45f61efeb0bbe071094d07db1efd504a3955a403197682cbe

      SHA512

      c17222c556cbf8f216318c7d1d6819ee27be4c44323526f098a18e658aa1217e8ac4d68ad3616f545596c9788120ce8446373788f33702fd309054a25ed03fb8

    • memory/2220-12-0x0000000140000000-0x00000001400042A0-memory.dmp
      Filesize

      16KB