Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-09-2024 18:27

General

  • Target

    d14458e804f08365d6b0ec741aedebd2.hta

  • Size

    29KB

  • MD5

    d14458e804f08365d6b0ec741aedebd2

  • SHA1

    ae78a964640ea3b17352f7639bf1dba97d903f5e

  • SHA256

    bc9977572b8ff171c0416afb3c1ee3b719a2598a704aa93832411b04bccdc31c

  • SHA512

    66971f943e7c9df89e9b021ecd7372cbbc721683685bd829312d2e8d9511a67d961cc106d0f89503630360e96133f0c7b9c5a19af3ec3177c83a1649d71dea73

  • SSDEEP

    384:OeiNYnl3Q/2irLwQbyACD1Ja7dnK2StQHonsfUD2O3Al3l0YKxAVi/a:n3Q/T/weyanKfnn4s2O3Al3lqx9S

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://192.168.180.12:7810/BKje

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\d14458e804f08365d6b0ec741aedebd2.hta"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\radBF0FF.tmp\Beta.exe
      "C:\Users\Admin\AppData\Local\Temp\radBF0FF.tmp\Beta.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\radBF0FF.tmp\Beta.exe

    Filesize

    14KB

    MD5

    4c0466a4add441228e21b76ec79d22d0

    SHA1

    7cad44491e42676def31ae6a4f7b1940a0bdd09f

    SHA256

    ccf3af35adbe67a458d5de83c50aac89b24dabafdee39dc47fdb1a5a85995083

    SHA512

    720b8b528030ec3aff64469a669ce7d72805376128f17dea1c8e358e8b381b23defa73a8db4221bf5d3622117c74e92bde16733d3757d4f754c3db569bb970f2

  • memory/2184-9-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2184-10-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2184-14-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB