Analysis

  • max time kernel
    122s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/09/2024, 11:25

General

  • Target

    0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe

  • Size

    1.8MB

  • MD5

    357180b526cb26772a3132c27bf1b677

  • SHA1

    1be6243147ecf00ba5077689aa0cb233775c4c96

  • SHA256

    0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5

  • SHA512

    3ac716abbc27dd8e33956deea76bc75d55c74839178782bcad99e87462358bb5185eb3343a3fbce5909d98fff1b6c7b6e0b9a65d3741fbbde82c606f1e9b9aeb

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO097OGi9JbBodjwC/hR:/3d5ZQ1VxJ+

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe
    "C:\Users\Admin\AppData\Local\Temp\0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\AppData\Local\Temp\0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe
      "C:\Users\Admin\AppData\Local\Temp\0e7502c682493526592707a77a57605a8e8d5ecacff7dc1f5da100ece4f1b3b5.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3032
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4bb5fff79c443a13ca6b687eb5cdf746

    SHA1

    55c99b0457ce000546b14ed067b007da8e1eef58

    SHA256

    0511f3cd248fac4c3d95ba26cb025f52b58cf034ff9c31ff96ce46faa1a3ad13

    SHA512

    000ba4f37c8240cda007d698655bc0612a929f7e9d8d4f853d32c1ea55fd6119a9caff52a6dca157a69beccb7b9168c3f20aadd0a38d7f51f652b7eafd7c5573

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    197a578aa9a7873c55ff0832e4d24e08

    SHA1

    dd6853e8f6dca754cf15af8e4edbd1ea2fb33cb0

    SHA256

    452fb7b0b565b0604d2d7f4a13e5aa5364d1a6bdf587b02295f9c3200740d443

    SHA512

    0677a9b74fe5f85af0728c3b32abc12d9bd6d3188243885bf7c5f1150eee22fd52c990f8fa7f9f47c4753fb9686337977e199537375bcf5d46fc8158c90589b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ff38174ec248d55f2294e663f89395c

    SHA1

    50ebae8b7a473c824718ea44a1b4419a3272ce35

    SHA256

    a4833c2abcddc4a4977987dcc6500cd86a9a9e6b57f6984d55ebccd4d5c633dc

    SHA512

    cbb908fe9684a38b04784449e07a1f20ca0496449fa415efa49757915e26b51ac628beb176aa3a34bd4e0c2d3fcdda6e8f98b4e638e3e317b2a193e9c35b0183

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a648842c4ad3b97a53d03ffaf43b47cd

    SHA1

    97e03222586c3a401993f84dfc1820147ee363a7

    SHA256

    3862756c679fed6460ed67ef67c22e3fa2e74a3e7cf048be90358c555e55f8a0

    SHA512

    d1b05ee0c60ecac9f8a3450ad4cb060306edfedf53aca16ac4a8f321b070dd965250398ef642456063979c28be1274e7e09305aaf362796799cd039251a2f746

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a5adcaacc7b60803735f8e8f05f435c

    SHA1

    b8b70dfab398e085ae6ec7e6bf4fc224c883d0d9

    SHA256

    bc2098ba46dcdcb2f09285026e5e91f9a06b4c8f08b7c086848a95d8aa12ec76

    SHA512

    77de83ead4899b5f0724a8144f4f08d84ffb3840edbc7de80c221338b6174f71dbca98131aca08c5168c7e525871767e7ee19a121d7b95dc07c586247078fd6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24176cca65725b36a899509ba450c183

    SHA1

    de4d74f7bcde65dbbdb15a04a6cc053a516195df

    SHA256

    b03d53f0b9c3a3663a24c855d42ad945511804cbc694490c7c023b25fcd930d1

    SHA512

    d97b0fe3ebe3a3bb422e147b59635ea6ff8214ce520fe2779a75238359ca4326bf960ff63ceffb6bb1c1909e8fb14fc19f627aa6b8c937b86f5c13d5606261bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df6494ea63d08a19fc5fa17a8277454f

    SHA1

    57c6bcee783c9de4672edaf3bfa7c13e3abd9a9c

    SHA256

    c0baf7542443776f48005f7e37c3703ef53bd054d814e31c5fd37c5df70af380

    SHA512

    dfd96044de424bb2ee013e3d6a10ab876344010fe8e82c68f09ee6f89acf9d1e4f1bf64e048362c24e7d4e1bbe55aaae9b88a44f43489fb4ed58b873f45c2bc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    038468a621a11776a07d4b4264c22de7

    SHA1

    f4a52068d2f178e92eb23afa6598964e1dafc894

    SHA256

    e754f4752df818eb20e139857707669b13597a6fd23283de2005430e66242761

    SHA512

    5425998802603adbb87445501188717f8e6bd66fafb19dac997afb5a7af8ded89327877aa7d4408aab03aaed40ec0329200423e98d36c762e0e9d2ceace47307

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e775db175e4e8427916cd8d4d636760

    SHA1

    c7ef7215dee39f0dfdfab022ce9013a730ab5b8a

    SHA256

    e65593006e22504c7d73598bbd14899e2ade9c18b19daf15fec18b107be5b89c

    SHA512

    0b4a62c0da0e902ca5b4ad9ee4cb7c3eca84391a3601f5efecea0fba1f35a79869a703ef12caec067868742ae1beee811e2ae29562023a50afedb557b7f4a03a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30cfe161bbebb17b756fd6463cc8bcab

    SHA1

    c6d1b4b02c78dbe1e150db22747e2be23b165c48

    SHA256

    14faa3764bbc81d6e250ecfb12da23e4a1a01ec56fbd36eb8b7a78a446bac8a7

    SHA512

    80ec24083786af86737e99f1ddc05e27a280c45cbdd3af960bc92fcf91b6c5337f50d43ba2df6d1a5f45979cacb303db8241c31251463bcfc4a25953375a6fad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e699ac5119397ef16f1d782b80e854df

    SHA1

    e6846cbd0356bef2b0a60d3079516c54ab12d438

    SHA256

    04b13df83392032b3bb947952a4d58a9bf644085376d8fb036996a64a9ceafa0

    SHA512

    46fb9fee9c8eac216483861ef0325026317c20b399f5b73986274d89d2061a5c95a160b6002cf74f654d42cd773f7b3ff7f98580491e0c53765f53e706e02dad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f07fc9ee4dfb0501634c0986a548dbe

    SHA1

    c17f577ee3260e5307be7c64a7f223d8aa3ee574

    SHA256

    610120d04dee18808bfb9602d83aa407ef1037a1e0d0e3f7bb534a0f1f3be444

    SHA512

    05f4edce900ed45f07bd3290f03bbc983d0d7b9f7fb54d3421d82a3292869b8ab97642c3a3f786923ede1f6548c50463e695b95feeb121095e847a447b2f9ef3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    602231d9b30648a3bd0f2ec8c1c8bee1

    SHA1

    eeeacfc275de295672ed92d79c29d7ff32534704

    SHA256

    61c8b47f0da4de13b8384d733484185b5f147bdaba0d4fd8344fa82b2eae4b9b

    SHA512

    abaf0357e8d0e97c2b833b4e7ba08bf082f8916a21c7866862a84c3243443c2ccf9b1ce7e3a8fa736786bcab6c4404d14e7f14c4ef379a64d672d94f5c6dac18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61db83d9b45cca9342db4a3fe2e166c8

    SHA1

    818d59fa3809207812768137f44b13a5e24965b1

    SHA256

    a73fab30c9a7d88b3e139dc95ed82f67806160c7d233adf111d804d131358bc9

    SHA512

    8bdf92786316336abd1f758b3dd8dbb2e08c02da2740d96f06a34b5ad4c6cff17ff5a584d4d36072edb7599ba5f90093dc56dd7412b13e9551b71867853e7b1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b977495f7cf7572a11cd5a9eb91b252

    SHA1

    d0f6b1fbc0fd31a8d3a12ddf74be6e8d53ffe82c

    SHA256

    871ada65f1cbbe0d4a43ca25694b705b4403c008e50bc45c224c87571e060a7a

    SHA512

    395fe02cb5439d272a1f5433ea81c7db874713aa2dd8b48ed9111fc3a714f70642978ce837b0e1026b4e1d3bcecca9efc41d363564b953c30b43cebbc00128a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44da3b8df01b0e0b22783f6688928961

    SHA1

    7b00602a2b84d4c788a338ee40c25df9235f785d

    SHA256

    bb1dcc5111b7cb2f359b6e7fa2842669456422335d7b507bf937245603be9581

    SHA512

    0392d31990952bb088b7219982d34ca1e1f50b076924ab911530f70f36c126aed9d2357fc844342fb4f3aa1fb2f8ba402626dacb1f379ef318ae8afc6ff02d4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    09f17b86d53e9e6ae928665f4a04bf3c

    SHA1

    5adce4824356c2569bc82c0a7897ff0262b4f07b

    SHA256

    c73004ef4b311518eca877ea00c2b718e3976201d3c72151ab464ace1adf0b01

    SHA512

    9622509cbae27d08b3e6903605c243e31515124b25a24b504ce64785ba96b8a6ce4e172cb9e80d6db457bf51e83d18b22f10465ed6d55e716e969a6b7816d0f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83c2f2a2bc94b5ddd86ad57922a5d6d4

    SHA1

    8b6daf7a43735d4f1f7e2c4fe0bb4c34557824aa

    SHA256

    edb555b5f1672d7f64470919d7114e20eb910a7e51cdb8c4b6b312fb8b2348ca

    SHA512

    9a0b97431e29255736f14d7053b031a74676e28178423491290fb90bbf69e98fe8337011566c8f2222d4599dc2acc7d8439646ef48e446e1b93ef42fcfb3e8f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dba722b2be16156d45664d003b6b9ef3

    SHA1

    e0457d3da3a983bd7e788fcb23de9c3f451c137f

    SHA256

    0b714827ced77c3bb8561e28e614d1d5562d286baa82531c38dd505dc9316995

    SHA512

    45b8fb9ffbdac3abf3be15e34958a124ef2cea744b3d33472ffafd3f8161c9b7adfd39d50495db1393e2eed48cc0aeee2ac33dde1be98bcb112f5827b77b0281

  • C:\Users\Admin\AppData\Local\Temp\CabAD62.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarADF1.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2104-9-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2104-6-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2104-11-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2172-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2172-2-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2172-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2172-4-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB