Analysis

  • max time kernel
    147s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2024 17:26

General

  • Target

    4f4c08584bbf0ed6851cecdc289630ff5b5efceb0ef000cdc3d76a8a215ade00.exe

  • Size

    1.8MB

  • MD5

    b328a98b5074fa4c146e2f40b7c7065a

  • SHA1

    fb8ffb48caf489ccebc5f53a194d894be7f1e1fb

  • SHA256

    4f4c08584bbf0ed6851cecdc289630ff5b5efceb0ef000cdc3d76a8a215ade00

  • SHA512

    969b9d39469701d3fe1994cb7a306ba77e96e44ca0b1e432241ee7f259196e8695c95355dbdc95cc56e1378eb03de862f70667f2966ac4c18a0bd3dffa540400

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09GOGi9JbBodjwC/hR:/3d5ZQ12xJ+

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f4c08584bbf0ed6851cecdc289630ff5b5efceb0ef000cdc3d76a8a215ade00.exe
    "C:\Users\Admin\AppData\Local\Temp\4f4c08584bbf0ed6851cecdc289630ff5b5efceb0ef000cdc3d76a8a215ade00.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Users\Admin\AppData\Local\Temp\4f4c08584bbf0ed6851cecdc289630ff5b5efceb0ef000cdc3d76a8a215ade00.exe
      "C:\Users\Admin\AppData\Local\Temp\4f4c08584bbf0ed6851cecdc289630ff5b5efceb0ef000cdc3d76a8a215ade00.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:536
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:536 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d8775b2384927398692ac01f4362048

    SHA1

    3bee9cfeb89ad50ddf7fef19971882716fc7de36

    SHA256

    a5dc369024e318625b4d89a789a47f21e71f92b9fc37103f575fdbc73a388b82

    SHA512

    279172f35dda2cf711afd3b09d8d8dfed0f719c867f4c2ccfaff3c28dfa1609c67b834e47a18b4f00933ec72ac3d6dd7fae72cbf0e05812e35daed92981bfae0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    174a83ddc9d44ba22897afa1b4beceaa

    SHA1

    2111021fbd8be0a790712690f2ba7b19a46ecfd2

    SHA256

    d3855359ef15aeff8d8727ff95469ea2a588f4a6d11b77a9c4f76add05fd61a7

    SHA512

    a0b4468d7a46042ba3c2f4af140b678f681b1a99c2edd53c88923b869d27e6abe0d0116951cf3f1ecd427fe974acb96ddd7b100d8939ee2b936ff5b8806dfe45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32466cc7abb58040dfde985d968f472f

    SHA1

    e709904a19e43efd2e895400fd21ba278b943c6c

    SHA256

    c1e3c3c9c32b643b578dbcb6ae2f0f881bb77ea04acb9149cf701c690ca5f588

    SHA512

    13b39e7fa268c53dcd86aa3de0f3689e7e5b80b1dfcd590aeec696ea0e5b86aea58eb2bfac5ff3cb48a0b9e802f33284cefd3cd93f95fa3b01182674f162c87e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e615a9e6a144a32d653af23a7806c75

    SHA1

    99e5e091dbcebc691b52df79dfe58cb887e38940

    SHA256

    78ff3a4384e952e3f0fece5558a2c1b241d91611cdc847b32f9e91919fe32309

    SHA512

    7199c3446a82f18911926c3f9e2020b117599692a3e1f8dbf7b154865970ffb9f92abebb99fc45292ce880832991035adca7de44e1013cbeed1bee28a71cd933

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cb248b1930d2b865f46178092761d4c

    SHA1

    89d4dfa15b99077e6b201b62edf25bd906c202f2

    SHA256

    63dc7452ee0dec9e8e92d0bdc77c9b567372b66fd236f62a8068092285306877

    SHA512

    4f1a6457ee150fbd03894550b6743ac0628df804f833712b0cd281018c24a3f03f477848285b5203abbb8bfcd1f1aeebc5d5e450170c18e19de872c4ad21efb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1fb68492642c4540bacf49052c67456

    SHA1

    810a853e808bfe4daed176889fe9ef0c8bf4d37a

    SHA256

    eff5c05aedc5d2d75a28ac02179f6cf414fa0db95d2b268d9d64610ce6f05cf3

    SHA512

    7f5f970a4501512492e17044408fda9682a2f0a814dbf97c74944f3b56c225c0024b387f5c764e4d8d04d3e06005194f85ea7bd3a4bf8b03b6dd5d95b78c8bc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc38af477fa78d38d525396cd6ebb15b

    SHA1

    42022a8c07ed1c3905f05f2656bbf976437b638e

    SHA256

    e924a5de935d74f8a5c09c16e17d14cf2d2e75f4faf3d358a3950180b999a82e

    SHA512

    699938ab0f782ee115694eb8f9cf47bbce62ef0e0103740f8ef6d5fd4c0f914a666c25d5b509cc62b69566f4a4f7581141a65b72e97841c44a5ac7b5e751491d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b463d543a2e6aa0a1a1f4a06301abb7

    SHA1

    90da9176103f72490eaa678d7880ecc5919a3fb1

    SHA256

    8e645946e92de970c1aefb67d1588694c367b00adf6ad5cceed1948486276b31

    SHA512

    a15f00f805cca216655b6fbb8e24b60f90eef7cb9d5265b9b95bf43a4ab6b56d5c893d34e143f85994d62d74b03cf4d973024577e25cdd31f2dda3572f09942b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e9e98870759ce7072909e2dd79d5d67

    SHA1

    4c72dd6b2ef0c1d65323cd9c301cb946220cdb7a

    SHA256

    5abb4d625ff7bab39193ca04f86c4ad65aae49e9e6fa4f8368f3b1b8a1756c2b

    SHA512

    c79843359a3c6d1d7f9cf4863ee605568308bebf90ac6c75a2cbac5aa5a05fbb540cf58171b8be9b4f72a74fe135895a7c538873f31a15c4639b6d0b2cad4990

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e97e5cc8d4bf6f63ddadfc2363624c6d

    SHA1

    927b80df0f7aa2c5017bb8ab74d21eb3950f645e

    SHA256

    f3fcd56fefcba68aa8558198747f1a26631488da597bcc347d08ce3424472c65

    SHA512

    a0d3ec7a149db4ea81a1038058a75b867f7a3863b4239b8aa05679da6e22a259ad3d6325ef5f99fde5e096b3c497c817b0aee113f73b274a3d52f55df9f23076

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57f0a6e1eb459cf9b06ed95890bb50bd

    SHA1

    91cda4c52eac7be09c27b8e3c5b746a95861045f

    SHA256

    2bdea34db1dcc4be6dd969fdacc0c41435405f883b22818a09ae68fd782f9d64

    SHA512

    18f9d60d831227147f5539ebd8e3418a06214e7c07cff6dc7d05b123058e07acdb7e39e2bfa92b39bbc6cad36ca7a54bddbd8008964442e5ddc6ba33edd190e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d470cc8a75ed261a2b1fde71baf2f738

    SHA1

    4391df5fd9f5484481eb4df75936275ce93da271

    SHA256

    277994ebb59665438050ad198ca2110a26e0bac480f2e34c8f304732c249e428

    SHA512

    3d9f64864ef261ad3394e6ae1431daf900a9a24d7eb9c7a8675b8e6e8dbfd8425460f67f0f6e96b63956fc456c288dca40faadaccabb8f0fe605ea53f043e875

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7dcc218a062f139984713a0b8958de56

    SHA1

    ba4d7b3c6adb9e460b7f187fb1fee12f73a597d4

    SHA256

    5a9d70e4855b6e6f3a1bf30df056260a8f8ae81035fc1e3a7899e07a908591cc

    SHA512

    ee3940c0ef04f3a47a6655d31b8cb2dc85851366eb59507bb664efea46967969d23517e10db2f03e26670d806f96df3345b148fac951a1fce6b7c2980cb8208e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab0f8289f84187961f412ef1b09b8352

    SHA1

    183a513b292fc87cbfdc464dacc69ab3b75b61c9

    SHA256

    623f594b7ec5e1815875b7053516c862e5d8835fdee3e765b8ddb88ca2369126

    SHA512

    d8d45cd56eed376bf628ae7a3caaf8d4d3cf277963bd1613a80c45806e4a8f5e85c96871094abbc9436c5f2cbb58e6223d1fd3f5592203fc4ba904c917b39110

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29bf7082d0042a54dee8247fe439d644

    SHA1

    85d245127ad8499d1914c7ce85a2786ae83bdf3f

    SHA256

    94360fe4483607f3826db9576f9934d624048fa8a72f9fa236589837f86f9d6c

    SHA512

    076bdc2e3f1443d4492dfee5cd91dd2b45c08b7e94ec44968e0a06299b0867894fae8c83d768ca555e71c6c68c25c1e0faecfd852101eb6dbe8fba66ff343a0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cca0252a646adb21b07c5e99726146ee

    SHA1

    fb9ffb16827b367723dda4520c78ba99eb47db42

    SHA256

    ec34bbef8f251ab590dbcc074b70a7f12f59d91b7a3fe460eb94f9d92418e5db

    SHA512

    61d86633d17c8399c303100624334755ae34245b28537250f4e4914fba555f33b45028a737b227babe9fca1925d1621fe8d94f151ca0ab542541a0c26fd7c988

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab768d7509e7e0593732ca397c9286e2

    SHA1

    c8c6ae1cde4f604cf6484d8c88bf2de7a7903d14

    SHA256

    825da1ddca62955739eb43eeaa9eca95b49f2be68daacf2c038b57604fa2a0e7

    SHA512

    c6cc729de907c35baebd349229d66d4a640680ab773037f0661898d9f8d35c44499a9db8a98dea1a3720e2ea9e13121f48d676aaef83740cd88ea12911caa57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7578026bed55f42f2934b392f3b37cb

    SHA1

    28b9c5382193da1dd92c3db29ec2a4ad72812805

    SHA256

    95f523f0fe8b4089d01456875eeaec6f405b3f5c4fc3ce4c2e60521d1e3de5d8

    SHA512

    5fabdc40c7845114807be14aca7f2e8f8e412fe66f3da3e3cc4950641ef1f64ac12644fc99a17fadd136dbf63dcf6ef4e949909f9c7fc8b1362e08a8bfdfb95d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f23cafea1101daf8c3845e461e9ea9a

    SHA1

    d89eb6fd396f66264916c2e8e04e8e2c348b3d78

    SHA256

    44bed82895a86545e6ac1c6906f37f0dfffb0a1198d9b07ad67b077e388f9624

    SHA512

    ee0b0562a53b0594633621dd8480d87ab1a01a705c1bb55ddaf7c6bb97d36e97d055aca966a154338938cd7e2410014f7f899ae8a6a1271e2d20be9de5dd8456

  • C:\Users\Admin\AppData\Local\Temp\Cab5C66.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5CD6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2184-9-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2184-6-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/2184-10-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/2184-12-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2860-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2860-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2860-2-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2860-4-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB