Analysis
-
max time kernel
120s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 06:51
Static task
static1
Behavioral task
behavioral1
Sample
0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe
Resource
win7-20240903-en
General
-
Target
0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe
-
Size
1.8MB
-
MD5
357180b526cb26772a3132c27bf1b677
-
SHA1
1be6243147ecf00ba5077689aa0cb233775c4c96
-
SHA256
0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5
-
SHA512
3ac716abbc27dd8e33956deea76bc75d55c74839178782bcad99e87462358bb5185eb3343a3fbce5909d98fff1b6c7b6e0b9a65d3741fbbde82c606f1e9b9aeb
-
SSDEEP
24576:/3vLRdVhZBK8NogWYO097OGi9JbBodjwC/hR:/3d5ZQ1VxJ+
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
1.15.12.73:4567
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\Y: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\I: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\J: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\Q: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\S: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\T: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\V: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\G: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\L: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\M: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\P: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\X: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\Z: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\A: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\E: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\U: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\B: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\H: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\K: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\N: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\O: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe File opened (read-only) \??\R: 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433495391" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000000fc3162bd511b8506fe12b805876894b1e0f751e6426e9567bac2f7e85d6961f000000000e80000000020000200000005f34cec97744469088c7d385154ad79fd40f99d1cbe72aeebdae52ae793dc7192000000060c4d4bec146aa4c1260b3ddd1968e01980dd31b1653741e48746c9d5f219acc4000000071958e44f8d3364ea376bf349a468795840d559a43efdb1d45e13bd588253456ffa42b4bea8387cfaae43c1ea1d29c4bd30d6c3c34a83df03b93d76e05ee877b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D70556F1-7BD3-11EF-BDF2-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e07ac7c4e00fdb01 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2616 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe Token: SeDebugPrivilege 2616 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe Token: SeDebugPrivilege 2012 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe Token: SeDebugPrivilege 2012 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 596 IEXPLORE.EXE 596 IEXPLORE.EXE 596 IEXPLORE.EXE 596 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2012 2616 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe 31 PID 2616 wrote to memory of 2012 2616 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe 31 PID 2616 wrote to memory of 2012 2616 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe 31 PID 2616 wrote to memory of 2012 2616 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe 31 PID 2012 wrote to memory of 2912 2012 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe 33 PID 2012 wrote to memory of 2912 2012 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe 33 PID 2012 wrote to memory of 2912 2012 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe 33 PID 2012 wrote to memory of 2912 2012 0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe 33 PID 2912 wrote to memory of 596 2912 iexplore.exe 34 PID 2912 wrote to memory of 596 2912 iexplore.exe 34 PID 2912 wrote to memory of 596 2912 iexplore.exe 34 PID 2912 wrote to memory of 596 2912 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe"C:\Users\Admin\AppData\Local\Temp\0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe"C:\Users\Admin\AppData\Local\Temp\0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe" Admin2⤵
- Drops file in Drivers directory
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:596
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd4df2171a56e7424e0a8767d2c400c3
SHA13a14dc4f41e86b7b6a50884c631fa2c843456ed8
SHA2565e139b60a29cbd82d6adaff4d90dcdb28b84a15966c48d61e1d6ca9529562a50
SHA51240983ef3ea42505884920c91d2a9f81b7509009251af20fbd8b6d6794e53d7f20851bbb5a86866b854ed9ae277832bfa9d37452a57507ac3ab9418d62506511a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52073f341e992d0b505935a3f599dffd4
SHA192160fb8901097a512b8f8fb91e9b50e15c7fe1f
SHA2564fb2dde21e15838edb78f0b5a30c79d60e41d5b5909449c52cf7c9a795ebe6a7
SHA5126e3e814a742accdaf65c49e976c97366352183b6fa415cdbec797c2947ba0e25da5060bc83bc44aea90fb13d582a45564ceab5896d0076342f2250314ce894e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3d94f2fbc92e873a57c31c206688fa5
SHA1581e80cd137051ed192f8d7771f267bc4c46a983
SHA256f6c27218c3919abf97f675186d2486a3c15f52e67fb1b7bb0c40178c5296b7c1
SHA512f0fc7a11f0093040502b6b87680fa8cac74de0a00c5255ad8da7b281b1f6f2f39acb254f8ae4ecb8746051957aad8269a7de55faedc04c625a02f22d32237bc4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b