Analysis

  • max time kernel
    117s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 20:43

General

  • Target

    e441db3e3f7cf3519f7aca1d85b1b925655ca011dfe91aa6983a59b97a50314e.exe

  • Size

    793KB

  • MD5

    12c839c0e82ac3e3a2d6ed2ee1f2e698

  • SHA1

    03cc269fd70629bac04fb52034c77c76a3c0bede

  • SHA256

    e441db3e3f7cf3519f7aca1d85b1b925655ca011dfe91aa6983a59b97a50314e

  • SHA512

    3ec422007988adda3c96febce17801d15278cd95a3f85009e4f0741e441b5c1ac630a688a34dd4f73923b548f50bb8a08961ee8415f40628b5965d03de24ee7b

  • SSDEEP

    24576:L6ftojDBeSYnItP3CZt6IZx89W0CxV9asvCpm2:LLp9oItfmf8Alm

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e441db3e3f7cf3519f7aca1d85b1b925655ca011dfe91aa6983a59b97a50314e.exe
    "C:\Users\Admin\AppData\Local\Temp\e441db3e3f7cf3519f7aca1d85b1b925655ca011dfe91aa6983a59b97a50314e.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Users\Admin\AppData\Local\Temp\e441db3e3f7cf3519f7aca1d85b1b925655ca011dfe91aa6983a59b97a50314e.exe
      "C:\Users\Admin\AppData\Local\Temp\e441db3e3f7cf3519f7aca1d85b1b925655ca011dfe91aa6983a59b97a50314e.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dee135f50903cceff6d10fc51567a47c

    SHA1

    7490b9f5f585e6ca0bdef3bc5810cbf82a794ab8

    SHA256

    6a96183f5794fc89e98ef95b157aa82d27f074f0118e27cad0de3dea0379b774

    SHA512

    5e0c3942cad06e302f90e466cc2fdd31d511e1d6ab6d085e21d0d99463310d0c605c71f6ff80a55442bd4ae5b1a828a8a7fb1295abbe3b13e1d429e84344dafa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eaee93e9274556d15c1504ac69037cd4

    SHA1

    c613b4a7108524220b444dce7b7a4c9a9b0e4f1d

    SHA256

    4798aa9b13ff44fead32391caf637bdcabe4bb6b1613f3fb7c2ea88f7922b518

    SHA512

    9c9d543737c23ec54d5d878cc9011ed1c920f443d32ca1149fdcdcf80dd15e10223b6f5109731fca8c4ac1083ba7700e45953ed6df2897c8de509a16c7d872d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93003b520255ce81a76346c7df57c856

    SHA1

    d768a9c5ebd6cd5a40a83fa9ddadcf96dbbcade5

    SHA256

    e8a59b5b8b9327e856ce921492d692afb71c9542be30e128a9475e97fb4030e1

    SHA512

    8dd7d088cb0f29debd3957c7629d09bb38f38c5edab2db6c7d63fe393db350846d466372db591987b471cee1285d4cceb4daed7c171fcf18927afbe7420edec0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3af9de31ed08f5a663280abdf783cedf

    SHA1

    3a8fe5f4d5dc1f1d683eb20e600e964d844dd73c

    SHA256

    d62d0d43ff6387518877957b4a67b3938571b7006434b1ccf8000c642b1d241b

    SHA512

    21730fbdfd08211735a0f1d3696b3874fdb8559f3a85c63db1852c9de3b76216d0aa1cf5182f9ab190fa3877bbbf90b4c7ec737def567a9a34e83f1926046f38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a38defc86513d59f61074554067c4493

    SHA1

    217a8cc927a688bccd350aa06cc03511b43ef25d

    SHA256

    4c0aea44130a531ad465c1fb28abc5fda3a435f4975c902cbfbec27fd4be20b0

    SHA512

    7e174273a0ae92ffe26beb35a4b9a2fc073dd439d0ce25d1305b71bdc3d9ca080be8f918cb40d15eb0c28165e35d822d0af66e2b93cf8faa894fcd1d0060af6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1a770507f80c4941318acce5659d5b0

    SHA1

    9832a8b81058ab5fe216c55ed083d039c514f6e8

    SHA256

    69dad11f8ed7e0a2990f2a313eb3835603142dbb3db7d6a00d407b6c2fb178da

    SHA512

    ecbfe90be7908272438ae9b9765cc6b2fbf719a5eafe3abb6d18d6761526874d5daae425cc8446342a04b92beb7ca4135dd78d6ce5d37ec7ca708c7d436363a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7d0ae3bb9a07e73a5eb6ce5bd95d32f

    SHA1

    c91e91291691635fc664c6457dd103f7a6b38447

    SHA256

    57b7bba9a54f02d66ee8961d8fcb12d88892b2509fa6672571f5855da9ff2598

    SHA512

    1720b6c09a22e2775447336b4f9af15b8475d452d6c6118f11cd932f4722fc08743d6db3a69e3f6f07cc44ac0e6cda04ac95b040432fd15adcf1388bf4f5c3f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30d120ee27f64b1dc69f9bde145fa452

    SHA1

    40508fdf43c9952bbec17af5fb19d83ce653d082

    SHA256

    909de35f960cf34c9ed20fa1c7f229eef84d8e8133d81bc8fee033b4928863a0

    SHA512

    41bc4ad7c0f8088b392554484ed0682d5d6e320f68c06d1b870aeb0b3eea1799731244805db557a85359d074dd41c879c9d8b26c72ee251ecfe955d48e2a78b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    544ca1a6f000b6d700078eb0d751ef03

    SHA1

    3f917f96310357c6119feac1b1bd458b57adf83f

    SHA256

    13aff741e9cc39c367094331eadb19ca068d7d11f19afc5eac2a332d272bd144

    SHA512

    920bbcdabd85100066df07c788de3e62d000a3e68b6764d8dd713070f9703c3ab643500de8930a940afbece049ed48100aae5aa8801133d8c0de4f4bf4ea4c41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40851ef0694d8cbd36842c83d2714203

    SHA1

    de47368fc6bb2ab28468253a252e540a793c2e56

    SHA256

    9cee8c52102c9cb4debb283d6ae4047e8369c18837ef1b93896f0e3c807b8b04

    SHA512

    b12cdf6a43fa93280fc6c54aef1c2b880aabc2ceda74d2e8e6f1ad70b5ae2d8a3606d5c1405882799b37b0dd9dc9d67c9db6b0e01475808c028af7a3b1e5630e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    018338ed976962a87229249ae4cb66ca

    SHA1

    a60bf5c9e090ffcb8a9d92b8d7ac2f8ed8120e58

    SHA256

    ad12cc45b327bf0079e0a1ce4f0b4bc84f6d748c6e57387c9f1071a8802d573a

    SHA512

    3bc901e063eba62dc3853a6a85cb14602f2a5fac13f6fa15c3fdd81f286bd89f5d729e4c78e2b82d810d586d1e919fede3c8d4f21b090978dd770bdb32525177

  • C:\Users\Admin\AppData\Local\Temp\CabA5E3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA6A1.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2660-15-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/2660-12-0x00000000036D0000-0x00000000038BC000-memory.dmp

    Filesize

    1.9MB

  • memory/2660-4-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/2660-7-0x0000000000360000-0x0000000000361000-memory.dmp

    Filesize

    4KB

  • memory/2660-5-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/2660-6-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/2660-2-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/2660-0-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/2660-1-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/2660-3-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/2708-9-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/2708-25-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/2708-21-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/2708-22-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2708-18-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2708-8-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/2708-10-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/2708-11-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/2708-16-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB