Analysis

  • max time kernel
    121s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2024 20:59

General

  • Target

    65158a271917b2dbed5ce52df7073288d9ae3305cc0922ff431cee4ffdf6dcfb.exe

  • Size

    1.8MB

  • MD5

    660d86b160eb7bf421b5782906adcccb

  • SHA1

    8d54bb1a5bda036a4fc4af5cdf07219728c62e95

  • SHA256

    65158a271917b2dbed5ce52df7073288d9ae3305cc0922ff431cee4ffdf6dcfb

  • SHA512

    f098f81847aa528e6839c17c9f6e01e657c7b321b7da19ef453286bc2eee6ed5490dad58eedb3704d548977dc47600ceeb8e8ee64694f2dded40523d1d457eb4

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09LOGi9JoBqgvppOir7kw8atSw6ZwaIi0HjwC/hR:/3d5ZQ1NxJ/QUiUUt96Z0D

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65158a271917b2dbed5ce52df7073288d9ae3305cc0922ff431cee4ffdf6dcfb.exe
    "C:\Users\Admin\AppData\Local\Temp\65158a271917b2dbed5ce52df7073288d9ae3305cc0922ff431cee4ffdf6dcfb.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:320
    • C:\Users\Admin\AppData\Local\Temp\65158a271917b2dbed5ce52df7073288d9ae3305cc0922ff431cee4ffdf6dcfb.exe
      "C:\Users\Admin\AppData\Local\Temp\65158a271917b2dbed5ce52df7073288d9ae3305cc0922ff431cee4ffdf6dcfb.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2320
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ebd6b51a940d7fcdff72bc8b8fd4e08e

    SHA1

    7f365fdfd438d9828abf2c793e3664fe24c159b2

    SHA256

    9c2da57df72e1a66180fa93eb0ff43c1dc2ef99025f7850566e2e38b7cc54e1a

    SHA512

    ed355e5d6066e1619f538d3319001e38ea2ea8bc9bb57d178b408e50a2d1f434e43e65a982a86819b3feb345856dc65b46d5b1767508f1b4bf757446760ee815

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e472845dcad8868ae6b7fc89951b3ea8

    SHA1

    b404565033de9cef5a2b5c1cb8b1477d0becbfc4

    SHA256

    590f839b0295420b847c1d7a2e3a4d5ea7469d5b664d364b5b0826d02dd06694

    SHA512

    54ca17e4bcc02092b0d7d81ed8e6e2997cf2767044a5646bd2a00a0541eec7121fd3ded9c6a33a9d1051eb952c78d78662306b8fe4428eb7a656c964a18d4ec1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    633a6cebe5e341a3411240fd6f2aee05

    SHA1

    762349036e4fa9b8b1814c2a92c59122f78397c7

    SHA256

    e671c9baea16ee636e90b145c924095332e4c86312ce1dc79e18bff0761f3588

    SHA512

    dfb4c96043f6b3e1e0f3bf135601aba0c517424e0dcd3fa0033a998125eef4c7651d265dda7d2180330b353e989488fe361950dd9baecb5e659354cfcc4cac0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90985ebd1b9d6f03abc035c739c82b36

    SHA1

    799ebeedc727cdd7729aa6fd7f0cfbf16f369a05

    SHA256

    b4d6ca274226dcce2e4052494ccd0216cc4cbc39b6890a063e085f00799565de

    SHA512

    3c225a61fa7328cb3dc51d69016d4762673dd79ec3d0a8c8feb9d85a18957f417014aa0e6ee8431586a0744c2c2adbdf87b2cf92aa8526d3029500c7739ae010

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0fecfed30672af26658e262ac40ccebe

    SHA1

    18f206139352b98c8e672bbbb385085fb3b3722c

    SHA256

    c5925608106b0fb7ba354961e09df622810a3a5b60cbc5592328b4e2f711f587

    SHA512

    08c0f77eb18e1ce7a4889f4993e2fa1562a97f4f78f6cd3b91b1137031eb5dcc0eda684680ab500ea4617cc68bb8b0f30c88c523d52a3e2639663a189034e53a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    433160927369a7a8b416c7af46f98c15

    SHA1

    e43b60994d8beb6413a9d411fef11d74e3042ce6

    SHA256

    73a0b03f30e66bb0a8dffa80f809497ee196558745a24f8a51b60960808580a2

    SHA512

    54f29b97a1de47d9180d086a7a6e51430cce02d13ea1e407dfbbbd42c745671740c3b3a201b78e47593043306943b9bf220a82dbb0e7aa3383c6d26816d7150a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86b0d293b916ddd382d64ac8c1c0c7d8

    SHA1

    f3f396aef7b749f9aa7d2b1a6c8bbea4c4e4a8f4

    SHA256

    6913f3aac07ca18318328ed579cb2e0198ecd6b5fcd7997a2d80a93a5730501f

    SHA512

    cdc352d8682f2af646b8d760241d0a22691dd9b40e288a30a54f0d0d55f9a783efff0a8b48717e1a745fa6849f41ff390a15c7296e3f0446d42f7e63df3d9969

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    410300791670a0376fe42f740ad81386

    SHA1

    2de62ae3dac8092bb1a1c4b757f5f4cd32c4d17f

    SHA256

    6012829d379bf2dd530af273221a6428545d27ade59b8d39eb0a1ed5c5dfb434

    SHA512

    c60ed0282794f08d7b68a7fc1d35cacca2ef3165ced2647474dda205ef6f70d950e513756e6c5e1bc8e220e14589b9b463781bf0ca987d0ddc14956a14772f4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db9aeb4580cb87eeef025d0102e60eff

    SHA1

    1921b48f4dccbbda287eaf49b278a23738902319

    SHA256

    817eca79a31fab5b1c09a39d7a1bde98becb5391540cb3dd1f45c4fae26e1196

    SHA512

    343e12572fceac2f0e167d20bc30b81970aee74b9a34fa342436f10bba77f36d6ffd78b34660466c62e97f7397a86f79aa799f522fc688241b5fb18493fbff2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a8aa6247c7a528c14d3fe042310e0ba

    SHA1

    b0f74a5cea2714f02013b56f196bb7384f87bba9

    SHA256

    4d8e52da5fa2aefcaa9bf37e3cf5617caf625a9bb920f13df29609e020c16a26

    SHA512

    33371c1c88401b14abbb62cbf141ef98130fce9b4a28c3313c5eb7f60304d4014d50ea4c4c6fe177bcb700de2612ed86d0e209c216f318910c16f3733a1e0ac4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a5115ddc02806d1c5f4d43528c270b3

    SHA1

    db065118d3392db6e52d1aeea8e7f23ea3d969d4

    SHA256

    9dc0caaa8a46f4267b0dfb710a3e49eff12f7fac4b2ca2e371623032b51d0ac5

    SHA512

    b7782e6e6003836baaeff2192318914cb5d086f841b863c6eec3d15644b741e70f9915d10491f913c0477a14fe2aadf1a0d00714c0d972accb469a8f29765d44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e63f76d6cf5239f768cc35dcb047170c

    SHA1

    dd490e3815a586c2e123ed0aef310991c5e9d573

    SHA256

    ffccfa78a417a75a44d257d5739b2743b7e3dc0c85c5613bcd303a9d18c88787

    SHA512

    fedf74ba26c9e108aca7c1f06c4fcace14e5bc4ed5b701d0223bca462fcb7e1e1d3ec961b75f7f5a23d11a61b83efc939f1e2cdc4eff09ca436d970ab94aa44e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6677afd75d4d33c1e3d0128893ea097f

    SHA1

    9d260b2503bed89aadd83a4130a23afd8c7ffed2

    SHA256

    88c6537aeade7cd731db9253830a13e729cb5ec6266c1ca99d4da4b42cb1d657

    SHA512

    2c4165c0e1f9761bb422efea9f620cacb2b3a31867b4f187cf94edb794af703198ec4160b491850c910ec1dc12b97afa48f608246bf9086412cbe550abf4de49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    228f92f468c55a194c3a5342ca0a4791

    SHA1

    6d95f9d39986a48ac86969eac4b82788dfb50508

    SHA256

    a6b9e0abb0f0e1554aab951876ddfab9db85a59e9f49c8059800c162a277406c

    SHA512

    4df78363b772a34ad4be107ef109dd2eefbd7041a30f4c2ff9ced9c92aa49b02311b4e3de61b4ddcf778a88ec1a9e4e4ea3cd0853aae549a55faceb722e1462b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3fe3fa97f2de78ebbcd025707d557ebf

    SHA1

    5629f62d4b3890f8e05cc09884ec4ff40ff9de47

    SHA256

    66acfbd6850bd40a9fe3bf99a363f0b4b4dcc92143c430a198ae6d4114efbad2

    SHA512

    628a2d68a6559b3608dbcaa8b74c6563a6eec3030d47343de3faedf4bb3412757e34b177391de11c91e6d118b7572f933bacac2099ac8ded085bdafc7be899ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26a88fe0269a158d3853b6b220e4f5eb

    SHA1

    1f339284a9200473f71b2df6afdd18ea5c7a1672

    SHA256

    29d20ca3dc5613969784d4e52dc1d588ae110db0f36ff1ee5b88855506c75ddc

    SHA512

    4e57fbdb1462331c7579e1a447a925500bcafda7cabc8841e3abbf3da85525dbbf9687d8ff16a2b8d5fdb51215251ae544db055265e7ae596373fc0426be083d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    900b9b31034f6cfd14a1fd9204fb45a1

    SHA1

    9e5eabab20bf24619d2e7cf66fe85b5061d1fe7c

    SHA256

    cb2509a45c7cbaebc0c11c8e6e76d02212c7c1e992611dceb1f7dd3e2762fb54

    SHA512

    3bb2ed5f26f9dcb9098c3e7249313c37acf37c3b61f15993cf4769bd606faf51f9418a8265344c99f311d7392f3c4531fcd7e989d9eba373b69d39a26b034d1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44d58990934e6ddde0d8d167dbb2f3dc

    SHA1

    ae4f9228ec3938fb722ca75de5cc1a0ad4cc648c

    SHA256

    1d25a6538f163517701f6d3beb05f2d718fd4429ecdcec72d0835deebdf75f7f

    SHA512

    2c039f7074e41a31719213ae002e5d189ea3be05f8ac4e24ea9bdda95232fe4bf0e14258d8fb11e58de23a1ff9be58bd9fa08448b73c025f0af1cf8ed2d20288

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ae86fa878c6ce8e398597b23ca76e16

    SHA1

    efac25bfa7f245ae7f6467656909c9f22b24d53d

    SHA256

    f178a2629c9ce9b50e08a88603909bf4604fa2c0981bd416acff57168e97ea44

    SHA512

    b0a7de9a9c883c1075b7730f8852aec7b766c6050af2893c6c42fd0ea884db973e738d7f99934a104244192ec67723d1180e88ddcae45cbb0ce144ec49156b3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9543022bacb2f3c20ddc69a007f77103

    SHA1

    4df60dd4207dd65dc12153dffac56ca6c043d9b1

    SHA256

    ed066211a3cb650acac210929a6cbb030a1d699121d8c7435ccf57b380b7285d

    SHA512

    426c8ae16d1c48576960e328f2dd77ce70fb8d3660d1936cf9710a9febd58a43c96c322944a402cb8d0bf92fca6f9d02ead7e6caef179409ffafe70c728339ff

  • C:\Users\Admin\AppData\Local\Temp\CabB8E4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB995.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/320-1-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/320-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/320-2-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/320-4-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/3012-6-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/3012-9-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/3012-11-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB