Analysis

  • max time kernel
    86s
  • max time network
    81s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-09-2024 08:41

General

  • Target

    3ce5a5eec8cc333a09cef77ff7c5cdcacb57e9031173b52e500971840859eac3N.exe

  • Size

    1.8MB

  • MD5

    8bc94255b0c3a9235c1922f51f55eca0

  • SHA1

    054bdfefcaa0779425475ae182f6ae5726a8017e

  • SHA256

    3ce5a5eec8cc333a09cef77ff7c5cdcacb57e9031173b52e500971840859eac3

  • SHA512

    73947b96d2643f460cea4abba1015735fa5ad0dabaf72eb349b01389bb29c2cddf81f232ba2a647ec88e6f308f803dbe2cdec47f928e686d39f7bbbaadbe0437

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09kOGi9JbBodjwC/hR:/3d5ZQ1sxJ+

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ce5a5eec8cc333a09cef77ff7c5cdcacb57e9031173b52e500971840859eac3N.exe
    "C:\Users\Admin\AppData\Local\Temp\3ce5a5eec8cc333a09cef77ff7c5cdcacb57e9031173b52e500971840859eac3N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Users\Admin\AppData\Local\Temp\3ce5a5eec8cc333a09cef77ff7c5cdcacb57e9031173b52e500971840859eac3N.exe
      "C:\Users\Admin\AppData\Local\Temp\3ce5a5eec8cc333a09cef77ff7c5cdcacb57e9031173b52e500971840859eac3N.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfa639b78b2d169490a4f7dc742b6586

    SHA1

    8dbf31b5ced7198abc13f8a3a174c67a07423646

    SHA256

    1d5947f018c45a98eb275e21b5189e65c1638224811c9af4da944a5ee590359c

    SHA512

    906f9a73bf0df4411d686e0c84f3ca5945e70a654a2fc1dea9cc8ba2be29c9e5523132cd3d4d80e5602a3e22dd48a65bbabdb7d53dba0fb00c687c47e5ba651b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e8028afbbc5f721d1ef88b6327770f54

    SHA1

    3c2d3d2189966ed4b5ee99b7b5cde41a05c83032

    SHA256

    aae232ee4e35c7ee215c2c4e3182024268dc2db94e5b37da3d7e0f584be16f82

    SHA512

    7089a25a69cd0520da60f642de4e507ca177f611fe897903b3c5292ccb678676e8449feef28deb20f0dc20499f0a6116b6896ade2489884ef85b3dc6f8536f0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ecc2bafe0c37701fc6cf90118b735de

    SHA1

    36b74b98d93407f85248da7769ab71a851c825be

    SHA256

    70560bd1eca4a29217b2d294fd12c9c865b568daacb9a9ea8b38a5c435e65239

    SHA512

    febb6840e99eccd34f7991caea87b925f949898679ad4b9d7c8851956f8de2db775c3fcb5a733edb2d43380cb8612fe339eb79b569eb058b70fd52a259405f99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d5a96f75ed737fd0a7fa50dceb02687

    SHA1

    cb1769a47222675e21b1433952f9ecc5df583deb

    SHA256

    4717993728ffaa469e27c9f6d15d51dcaec375e0cd110704a3070144d40ce422

    SHA512

    320643c251a3226fa104ed9dddbbe04094be161b1e37abe3d2a335f74e69fced2a674ad13d2fd31c1e0855519e03e4b3b50fc72287833f3b6e98abaff705f789

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18287091ddbc585ca5ef3976af1d4d43

    SHA1

    654a5eebc25745ea059e3768e5cf2b6156062311

    SHA256

    a6839b67042870f2d1a3ed26d4db957d7d3f6ca4c3fb4178de3c2ac10cb61994

    SHA512

    4205322ea9ecc2bd20798b92f5fdada06d5fac27be0b6eb3e4cd3515acd42dc9c089f352f4fb3448c738a94a4edc03d6a17349a8e944f835422d355fa327dde3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84184da1c75a35c00a24196865d5de5c

    SHA1

    4068cf444d995ba459930b2cd9d805851fc4ae64

    SHA256

    86f8a74387dd6a06c7b0ef4ac48b6be1c95ae4e7fd6d68e2d3c2c5ec0429cab3

    SHA512

    774cf33569ebed90bca43aab0ca28fc977627c8ad103fc2371888e31f5a141795d37862050a3ea4b1f5e4ac6d40c68ad714702d87a316d5b888a93478cfce061

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e85dc6c67c6f27ea28f0ca2b521a46ea

    SHA1

    b39b4c4aac906f4b225cd25a1c3cc6b400317134

    SHA256

    d639403040302bcf0afab5dcad9d7d8746faaf09fe79436b232365da57b06b34

    SHA512

    05a6c263c83703d5a396c7e1f28c017487bb33164f70e1269932756a18789ffe1af6ad94e8b7c6297fbfc089214947fbd20be4c4cd41324298b16de33f95b322

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    625a9d7db55eed7f671b84d12f7b20d7

    SHA1

    9453962ad74e356ae07a131e6f6322fba6851961

    SHA256

    2524edbc5141f1d8aa7a5c9fa45066640c8fa5414b58328a42600c57e9e12e9b

    SHA512

    e79bdb6ecffdd5e9d2d6777eb1d99a9138dbf4a0e99c436aa50027aa3ad7340fac73dc2fd880ea6b71209bac5803824f34fe04f94fd47b0343b9575b86a947c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f29418f832467bffcd7176624946031

    SHA1

    fad094eaecfb41295cf12ddb5ac1fc7779993d23

    SHA256

    5d4e9f261b80f79e47a9cb098e4e8f938576f72cf89a8dd25e9721a175afc75e

    SHA512

    7ff4d941e5563a182aa185c6aa30f87ea796a5aaafc0a68ca0796a4e96214789c102a9605b0d9b709453fb679e9fe276770b5637e413cbdf65e06bd95d46616c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9e9047d06e198ccb992d85b9a6b05ba

    SHA1

    dd5e0619a64e35f50da0cb1880a02c94d064d941

    SHA256

    e30764e2fc496f174a5f846ce84c6f19684b2d38b40765d4c3bb9a511a6f8951

    SHA512

    ac7ab18a43f1ca72175a8e23c684d6c3998f62189693009e7a42e9485f660e2e35d5c84f6d4d01f9b7419a6d4835039c874d5bdb60926b1e3f1182bd238d14db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3fa53aec3349bc13f0a283bd31b1b7a

    SHA1

    473282065694981d112345d990f5570caff9a7d5

    SHA256

    2b670cb827e36f5cd273ef63c141e560ca1a41595213bd4dd612020ae9a7bb2b

    SHA512

    5852d0a64a59f4d64566d417f1bc03c11056ce8918cdbf90cc5d269513e069799dc803b7099ee7bf6f463231b5aa8bff721615f16d69f41c642b25c5354b71bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    444bdab8c654698e4650dce3cde10b18

    SHA1

    144f79f06f2dc8bb0d255b342da905cf1867749a

    SHA256

    216aa5b3f165e0415db4a1fac3bd4e455eb24442dda343eeb8ccd63bff3f0615

    SHA512

    805539b5d1d52477ea88ea0f44d359405327b0dcfd790cfb264376746ff1c4b9e49be4f3a452ddfc01e6bfe819df6eb9163fa7350064c169af9bb02fe1a97d8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa29f4890939c6b482ad161cb3f32fb1

    SHA1

    46a9cb6e2eb36e167c25c428da1e391972bcafae

    SHA256

    e23e639e3d3bd9e4d07ad7e7967abfb1af185343c9940a7e3cafb27d06a88935

    SHA512

    28315755a5e7cf1700d5d8386bf0221a84ad7756ac079bbe1d782547c6383b4f9fef3d73e38f8529d0e932af0bc1af7420d239647fcffad121d7104f85fffed6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e69c638133ba56d8a0a1ab64c3eb8ac

    SHA1

    49bd9b795c89d2f6cb31bf1b2ebfea9d4890d411

    SHA256

    58de168832b3a3bc91e80a2a609a9b0c737270890797fef96a53f605c3e8c302

    SHA512

    9c4eae28405cdd16606b6c8172a1183443f48c9fd6dd8b54e890543f25a89dd5053079dab5508560022e8305fd0f73c5dd12072bf721e4ce96d9abdf5c784c71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbc983deb5d79b938bfe7bb735a6a333

    SHA1

    b598e78377678c0966595bca90f8103f1b7e8670

    SHA256

    6f73ace390a8027e371d513630369a2c37bfe7bcc01f1a5316f910d43e170188

    SHA512

    fed17e3e08931a4005e5f3847b9cf78e1e7913af583445cb142ce8bd258743ee79b5f153c9cab2c66fab71bbea8e8ab88969d00a1156746af7fc386e95bd0224

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0011cdd69afe5ee12ea85597728d7405

    SHA1

    38051dd582e0579d83b157eaf26d596711a7064a

    SHA256

    3db6f9e50f5ac6c69f10cb2e490de0ff67438c65eea5028e4d35b3362a25e93f

    SHA512

    969b6e97a54f93ec78686a1abe6cebf0d8c85ecf1b09e87345c0bc594d7332c182727bcb8db0cf4b43d497ca07dd970e43898a7e5f9d43f9d5c8a7c6a423de90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2b29caaaf602028a43fac811743db37

    SHA1

    7551cf04bc9490ae3732a36da2ed79f4c811bf44

    SHA256

    fd9351e0e44e837e95f43473d528480acbf5c9427c2b5952f793542d63b46808

    SHA512

    298fb8cda0b4859610f6b529cdec94d5df422e6a6c0019d609caf4cdd57672e30b2f507a7a00829f70345677d010f0f5044009ec807253bf8415b226a673eeb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b27670d8894f19be04b36bc7905230b

    SHA1

    8546f82117f4ba511c7f53ebebb6ff574417cd19

    SHA256

    93f411605e8ab72db05c792f62bdf3dc705e134e11c67872d44920984fb5dc6e

    SHA512

    4d285edaaaff71ce30c311ed40df19b75bf4152cc9c415406e48862e33c5838a4e1c07ae403289a2d5c69ddbf4a88897ca206a810567a253fb08475a0d1d760d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d73d862fd8c6f61162606532738932ce

    SHA1

    543eb4f14683fc1cee9d226646d36a065176156d

    SHA256

    75144a5cffb004b2d86e8592e42199dbc42964a59cd7b46f3025cc7d93dd5dd7

    SHA512

    23959be7ed800b4f3f3af754b37ca2a01639dd159eb102a6cb9230907686fc469b13744a81e67b1fb8dabbd2606caa20c8136735884023187153721871dcb373

  • C:\Users\Admin\AppData\Local\Temp\Cab8C1C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8CCB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1920-2-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/1920-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1920-4-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/1920-3-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/3052-6-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/3052-9-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/3052-11-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB