Analysis

  • max time kernel
    148s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10-09-2024 10:41

General

  • Target

    c61787ae86b537a6a956717e28fa23ccb3855ef9ff249e6ee4e5613f7c39a985.exe

  • Size

    1.8MB

  • MD5

    766d7b6caefadba999686e2c4a904914

  • SHA1

    12630a843aedd5091e322ff97944458e7af77ddb

  • SHA256

    c61787ae86b537a6a956717e28fa23ccb3855ef9ff249e6ee4e5613f7c39a985

  • SHA512

    37f7a5b932fb0a04cf5696de2ca94d55993c866f11955b17a3a75d7b943ec052e4bf13aa9bd0d0565c4f957703a9c38ed0d1d2df2567dcf0b5fc4e435a8a72c4

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09cOGi9JbBodjwC/hR:/3d5ZQ18xJ+

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c61787ae86b537a6a956717e28fa23ccb3855ef9ff249e6ee4e5613f7c39a985.exe
    "C:\Users\Admin\AppData\Local\Temp\c61787ae86b537a6a956717e28fa23ccb3855ef9ff249e6ee4e5613f7c39a985.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Users\Admin\AppData\Local\Temp\c61787ae86b537a6a956717e28fa23ccb3855ef9ff249e6ee4e5613f7c39a985.exe
      "C:\Users\Admin\AppData\Local\Temp\c61787ae86b537a6a956717e28fa23ccb3855ef9ff249e6ee4e5613f7c39a985.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2736
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c095f56c4c389917a14a48ae77bb3606

    SHA1

    3041affaf6598bb74904bfb45c50ddbe8bbde3b1

    SHA256

    6b75c9fe53e3447773a72698aa3f986e02f0e91d007925d20d4310e10c5df296

    SHA512

    69f4c8299561032a7f393a61f171ae38934aa7b15ded7c3907998facf0946f5a93ab35444b6ec7bd89457d74fef956e0eba42dbc5ae7095b5a14262d1550f486

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    982bf65059c56504a98e94c3d3891433

    SHA1

    bf7472bf88d081b451f83d51049fd5cf1009748d

    SHA256

    7943089f6e4c095dcb5eda8e97241aaf18c333cd9333f68d674851b728c92b9d

    SHA512

    b77bdfe6c739a94929d73749112753727283cd3879f989ca08f81a93c871e8d46dc2c619e6f4d4cc1374bc0522aab21ecbc6cf2156cc891fe936e1dc998d2682

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7194998489f8c4b6522f24b7ece6ee7d

    SHA1

    63f79ffadc6c560abd38aff3087b71afa49e29f6

    SHA256

    c3c73955037ba40ba9b3b32155c7c201cbeb0bb35ab47746ebe9db7124b01c1b

    SHA512

    045d4b22de660d2cc92c4950901d3bdebdbf8bac415590ef54c675337c0f2471f970aa00ff80ce159fdee156f3cacd651a72ea0353143720020e1c3e33e71955

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce17ca5b7dc1ca28b0a414bd38abca0e

    SHA1

    8c69a951eba26204f90dcb4a47431733ee12195d

    SHA256

    810d7def151ffdf47dbf54085f2febd533abe735e6e1b5da0dc22a4cff6582d5

    SHA512

    f6c46ddbe4da1d1f6fd17b40f2c637b70d57f873c083ee4ed3a1a5f0cf32803ff6496ca6dc6623a9b20f91fd9508c7e5a85ecac3b0c0ab16837b754093e382d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3dfe95ff0d8cf1fcf5ab6a4d0da5d98e

    SHA1

    a9f9ece72c808f259708d46caaa73702777fafa0

    SHA256

    536fc8eef48100dc2538999bba0e7332de6031d6ded84879aec6272965e034ae

    SHA512

    c75b93cf0f46b6318a4b1455c03c0d57f848e0a318227484f7916237221ed8eecce22e4c3c42486be80db362d3ec82edb14817478dc6123731d4a30ff16cab32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c2805d6407d0d5122d4f51650f3814a

    SHA1

    f9b3592f4d2711d508794bb81a48dd11df91442a

    SHA256

    5620384b71b22de93ce2542c28593ba1b1682fbc143d183057bf0dd970957587

    SHA512

    7e37b731b149b24db3f8c8615c4ed990d6fcfc6ca3a66bab4a7150546d3e044b5b6a77aad31c4e1e5a070da36388d33c1936030684e08452882f7b7eb78e7cef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e8c76eea37785f5423f585d61065a30

    SHA1

    6ae03712e32695254e0251276af63d70a2269c0b

    SHA256

    498f66fb109817c6d2307c273450f0dfaf78917114fe31f001228f5b86023793

    SHA512

    595108e21ec3d39972c96e2e3e59cb36e2caeb2d2dcc16ad51fb6b1149773cee77cc993f3df4f018d80633107ce75f5a94096bf5b45c979a0f9b064a2f679cbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ead6f9cb3b6b1402253a39b5fb2d3994

    SHA1

    7a5db3ca10776e7d67c7fee17570ad16431132f6

    SHA256

    b45763c14731bbe0303f1c57b04285189ed6c0e2337be22230387735c42d7bfa

    SHA512

    f930d49e6f253baf61c015eda16124648c54f8d57d21c88f11057d9ff926172fced44e8ced4418a511bb38fcc908adaa70104435bd2b9d2596ce002e50c803cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63c29b73cb54f325a8365acb3ff5217f

    SHA1

    339fca50a91bc14dcdaa581a47da183d45766c12

    SHA256

    1d8ef238432e24101469ea5255d87fa674ea6e1455bf75f361f59b6e6e518167

    SHA512

    461d2579e1dc4fbbba78d233cd9f9729cd30f1870b717b529433849a036e3d2531de9ed5256cadc8e3e04cca9b36d7d87f1865c95171a2cc654adba2ef0fe04a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    188a7be95feca54b27a2395e96bab826

    SHA1

    241183371e904926c4a622237b6ed6bf0e78ac34

    SHA256

    104e1edd47341834d1307dc831312540ed5849bd9514dd40708d380922e35006

    SHA512

    49e07e9fc05f7a5f3b8f274536cb3d2aed147a1b09f214ea73a51c00ee6c6f6a3a3b4a62c5c691ed8fd1ee420ffe62fd51c7ddc5c53588be180e7260bb1cfad2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c14914fb6c06d6db913cceefd2e94400

    SHA1

    15e87be7a7cf648b1161b32f5dd48cecc227d24a

    SHA256

    241197c30d3b6224b53d4de0a5b5ee9ba6e9318a14eeba482a7b781814e915e5

    SHA512

    d95c3da62e32b98fab437ca8c84a9ef6da2f0b8ae0148e21fb9192da3369fc096aa05a29567cad68fb6265e4d1ccb4593bbb377c30ffe4b5fdce4cd01a0c447e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee1a5dde2553d63407b55d06c63079dc

    SHA1

    926d7e3455a825d9880db33470b0d9fb9311bcc8

    SHA256

    38c6ed23989b22ccdd503e104c93b694fd117ee7e7a9e0f8999adde54756317a

    SHA512

    bb5d8bc9aab1ca516ad0bf25a04bfacf695c0b5e8a0d7f49a06d657941137aaded651948185d26278e5dbdbebfe78e19f7056c1054724079620d224d98c00ddb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e38a218cffb68fb1d277c11892fd7da1

    SHA1

    237e11a2314c1f5282361732a0faf40a76141415

    SHA256

    a34678fbe5dcb16f12238b19b628da5a165c126f078f22a477fa967589dcd9cd

    SHA512

    cc32d02546f90a31c1ae862363d699b3fe7b37d11c6b22da0ac56bb266860d5a9cc0a31c15e00319e31b84ddbca5aac31e95999745b31837a8e6206308ffda12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30cf48723493bd287d1d349edf4fe087

    SHA1

    8cf623a593efa9c71b6cdc5524ce42a15b04f428

    SHA256

    5d7d46fa5b2051015e0a1f57e0a434c307bbc0ac834538148bd6cbb8c12e801f

    SHA512

    a2bcaef5e1df3f586d82ba76e48b0c802967d56574126739fd1131f87e5085d393231d4bc228a990a8b9c7656274fe704be7c406d32f0084d10503d0d422e7c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7d74c2ed31605dfbeb71d313ca05518

    SHA1

    d710723f96935936d7232d06d6f4a43b7c1bab9a

    SHA256

    e508587a886e4562b21aa06dfa47da4425614c19a3594b537e3b0d0a05c9f04d

    SHA512

    169491247ed6a6a4fdb5b195c2b0f3486d90da95badbb19358278b7f1c4959d5a7e0d8aa45a2a1b4b82135e0ad824b52daf92037c7e1a45d03104984541f9263

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0542ec20755722d213f52d8a668a15f0

    SHA1

    1a91019ebd77ea5b416a654ee5c333f2d2e87574

    SHA256

    a56b7ec4833f5919584504fb1023982d32b588a81d746355479ad03866b0aede

    SHA512

    8fe7d2073f6e7a1847d695f8f5c12c875e60a0da186c0874e8c0e066df2463c7ddf7fa7eca2055427360ff1ace54143d18e5c1ead1bbd903b01e27d16cd4f523

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1126f2511baea98ad6fa53bff0c3b772

    SHA1

    7bd0b7c75c6db45570552b4d3b95f05d5e5d8f03

    SHA256

    ac0fb0e9eddbd01fd29bdba8d65a55df980af61ef43d06b18867d92df4b8c867

    SHA512

    7d7f1eef8f19e9e0ec15077676633209d480cd79201a69a6843eecde997e8943475f07a8ae681cce87060dd9b15c53f94a2f3440f02e13023d9a80a2b539c66c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b96eb4f22116355b8f58a57e99ff963

    SHA1

    ec4e7aa4ff456dd94659932fdeef7641e93af322

    SHA256

    1f9b2ec576012e2466bbee5c4dec1927d0901d36a6921837d98a46fbf03033f0

    SHA512

    a39ffaf950956f8983b291e6e76289d31e8f4696403b9b263fe66eef6b2ed48e1772c3394af4c56230a90c9df7aa9916ba9155d9a5fb6371f6d243e464c68661

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4eba4bc0a249c7890b64357b06a56891

    SHA1

    d4d42ac9a62f55bdafa98b3b32b1504ab55f16b3

    SHA256

    08d4f42a0a41268c3aa981e80a40e45239238029e65c1c92a8a919449727d37f

    SHA512

    27db9994575d2cabcd4d0ce355907a9d126abc2960360c95d22639a6bb140a31764dbff0514044d8b0de5269948b2182aca0b6b28ac58c0df47478b7b3836703

  • C:\Users\Admin\AppData\Local\Temp\CabB35B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB3DB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2500-2-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2500-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2500-4-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2500-3-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2596-6-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2596-9-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2596-11-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB