Analysis

  • max time kernel
    106s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04-11-2024 22:01

General

  • Target

    aca2d81a9e0c6455ef2602ce86571a045af2e93e2207730e79389dd5aea312ddN.exe

  • Size

    1.8MB

  • MD5

    2af084d560905b629add7d1aeea1e3c0

  • SHA1

    0683da90a8aeb6847dcd5aa53c06046e41a0ed3c

  • SHA256

    aca2d81a9e0c6455ef2602ce86571a045af2e93e2207730e79389dd5aea312dd

  • SHA512

    0da4e730b901f8c1c6a2ff4252b3689dbc46ce44ba539983e0caf4a29bd5123e93e239693ebdb87fa826dd240b97458edcc68e13a73d592b5d378f7b6ae3eb9b

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09wOGi9JbBodjwC/hR:/3d5ZQ1QxJ+

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aca2d81a9e0c6455ef2602ce86571a045af2e93e2207730e79389dd5aea312ddN.exe
    "C:\Users\Admin\AppData\Local\Temp\aca2d81a9e0c6455ef2602ce86571a045af2e93e2207730e79389dd5aea312ddN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\aca2d81a9e0c6455ef2602ce86571a045af2e93e2207730e79389dd5aea312ddN.exe
      "C:\Users\Admin\AppData\Local\Temp\aca2d81a9e0c6455ef2602ce86571a045af2e93e2207730e79389dd5aea312ddN.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1616bebbd021e8fa163d154d39ae619

    SHA1

    7e543a97fb48ca0c7eab6a1e8a7c526ae14672e3

    SHA256

    1014b87f7aa45e296fc593090669b2a24b53188f69968c926a6248888ec7b6bc

    SHA512

    0e2cf84b0d2bc93a9dfc941f294387c21e1a73f0f9fae4bac61554e8e9e9da7ffb56ac307c2742bc7a80f73ec42b77d83e500d85f42882f671332af5432b19f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f62cebe0656b8b0f8542724cab013ffe

    SHA1

    b437db8e0a3d1d02786137c4d9378d511190f628

    SHA256

    d6257d336b1c6695a0c128785d53f19aa52840fbcae9af021d2756981de0e76e

    SHA512

    1b60dbcb4812a5c4d822eed917f2655a0b50b08ac15f4ec6c4b2766487063dc66b64f4ad9ea3abfc26e6629214f83dd64363ed1ed90518ac6f12477d0718605d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6aff07b7e530522f86a60a0e859ae938

    SHA1

    9e0a04bf1def248a35a0114805430a031051a2eb

    SHA256

    a6813d13c8c6c94b31df43a4bb1b5add510f05fc7b262bb58f41bdeeb30f5355

    SHA512

    a026873dac469808aa4fd89718da7473102e900f3389e8eabc654fdd34f24ce8db69d51c9dc9eb0d34200c32e854fe7bcfb5f019f23b941fd067a72e07a8aeaa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03946efcf5ca7de4b086e09e1e0842bc

    SHA1

    fbe240db3999529983295e054bfd95e14525edce

    SHA256

    5977e7f86a33549a35a6b7ac67be1db1131861fffc6fdef64a9b1a4df37a7062

    SHA512

    5eb365d80a1f7afb6aa7452410cb7fb0daaef0e86cbf614b9353b3fdb083130d8f57a3d487ea0f16ce3be471ef72de8bbb9a945a75524645cde2a0a633a40840

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    659fe52b64d3cca3dff7f1c50a668524

    SHA1

    dbcf07805ee61e979ab19e0da83ead77e88d12df

    SHA256

    5e248f435aa3b3b07fc1f78ebaf694dce1f6003dcfd58c89d55dd6fee713e4fb

    SHA512

    9202431774726cc0ad2d231010f787b698fe5ee91f660323f64f08f6ebc7821a68071c585872dbabe5feac2f3b1eb069ace6ea22a7eb8670bce686778da04f96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4c8e75dbb2a85ea72620c8b4a94ba91

    SHA1

    c185360455d02c425546dfb9f63af596ca5330a2

    SHA256

    1fdf644c255135dda168fa17b497c0a9fda26b1659c354f36c5ade41cb9e2002

    SHA512

    a79a598da5e97eedf5ecad63774524fe5e977e912f74d31c359c7e8a46018bbabcc31bc994adf91e74ccdd335acfaaeff341fc12be29618eefe9799d13816933

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a1473f6ba5bb84184b21b2a88796f48

    SHA1

    d467031ef1b01fdbc02236c4fd9183a6aa0b3c7c

    SHA256

    291b319d1b2f2f882a0f8dfa15a4cbdf7ed0306d99d9bc95b8fd026cfd89a64c

    SHA512

    d83598ed25088c1b48ff4f47656c1e0bd992906dbaff0f5dc31709db74570f32749cd33747e601e0181850c2351e0bb644fd744745c0cb04c3ee5b50b6510b87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fc0557a3ebe4184dfb287d789a88e0f

    SHA1

    3d2c38f414d771562cd0fd1c02f0b23841c32da1

    SHA256

    66da0bc3d76f8f79dcbdb40769b9bb5e59f3230ac42125948bd8f659d22bbe2c

    SHA512

    9b442c883ea8c8f81a7fe338a4ebcc3d7ec0998f335517f657111b31228de10a0cd6808961e5cfa538f907881da3f439b03776a32e3e7cb86c2b195ff0fa0640

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41cd76bab5701e1fc680f41e08761dda

    SHA1

    42c371503a11ef156d134f3b0df209623a894ab5

    SHA256

    39f8feb724c0d393c94fcff5d081dccd2fb2cca2dc14f42731dcb8225eabb5a1

    SHA512

    de56412a8d55c81524ab315ea761aba238e1d1b95e16a1f4f3be3077a063600b9e4ca12e3a94fff4f1d8e74910809bb8f48b3c83be8d70db427f7d7033cf09ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c895bdcbf9531efb18e0728f049114e1

    SHA1

    59d8b6646e3b19ac3304c8c4e4590de663bb7aa5

    SHA256

    d4d725e39fbf1024d1247221312155c66075ae3f6d757d791095119377e65f71

    SHA512

    eef7fc4845f59afd7dbf8daab89aec895d279667f038468738085337f4a9280106e0600c3f2999f15d93fbeead853f1366d3efd59a29f820edb00a603b6c2517

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee84e8bea701a2100960bb1499c9591b

    SHA1

    ec7124da8560aa30f778c24d19b323a3ffe57109

    SHA256

    dcf4f0b962f7aaf449a849d33ac97dca4f781b9ddbe3449a557e9204df545d02

    SHA512

    481b9fc4979f55bcf08d6818edf7694812812bc3d9c7d05b066dffee01cfd143d4b6b35cf78aa8823f866f1b3b7df79d5d6b0777560495d12d0bbb1fcc236481

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a557c1efe3f8d37bd1d4339307218826

    SHA1

    004027f3ced08ac5915ffc472ad2f057d73a9082

    SHA256

    7dae3cbf88439e869b7aad8b5d9ffbabc5698eb015506bde784bc170c4700c43

    SHA512

    89b46a900fbd97bbc6b3f98eafa9c3af1efb32654a57c11a2b33a5012183e65a8557441f1946c12d5750ab22bb3734cf2649cbceaf37698a19caebaacbd582d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    478e8b3e8ec4a05bde31f6ebaf81c943

    SHA1

    5f2ecdd93eeaeda007b2cee9f0ad9baac2e4df1c

    SHA256

    0e8f5a4199db4a5758f15d6ce2c5019bea319689159363bbc12cdd8d5962ba3e

    SHA512

    5930cd9db8cb10727e345c85ac58de18c280783a1e05cb7c5c6d5e98af255493a726192819f6fb765de0226862552fcb5f1dc68519ee6f6be7d33a486a19048b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e757a1d6a48adbfbbef5b73946d5ccf

    SHA1

    9a651766ffaa48324ad17fa558ba5b1df2565d20

    SHA256

    485e5026147cb1ea9b72faf3c62e3060a2135a7992f0cc861063b24c907b194a

    SHA512

    256d3fb48a207d28e3cca52368b52002bb0106bb683b29e4c9beb9a62bbe3569227a468f1c3a29c7fed24d2439e5c34c7344c622b52a86b35ac45bf76dcc13fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5014314621ac96a247bf98e15decb14a

    SHA1

    e091be8c1fba66a2ac2413ddd4f47cef63513e21

    SHA256

    b4bd59c3a9d2999c19d94d7506099be86e484ba4ed855630375d703c3c9e7d95

    SHA512

    a86ea0ef1e074acff7a0883fb083f80681515ce11bbf147311773c495c9d363fd5acec2937bee9b1ad6da444ebd02229ceb3a6a121b984fd7d0a487f32ea890b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dbd0913b9668660f7f4e071732bba323

    SHA1

    d99d2d4d1d5b29a78f9a633dbe54c67d9c8ab46e

    SHA256

    6b1eb5326770d30d7ec4231882123c4dfa586d67f62aabaf23604dda4adc9ac6

    SHA512

    14058b0586b028f13c49747137331e6b7b416cb2ab0404ce83509ca0c6dbc20e3ac4491c30ce433dae3e2eb8639f41a748b11ebc5670bdc4e77c7ccd810b14f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92f70ad2996f530d906498c5b655306d

    SHA1

    d0d42316b0afbfb6f6ccd94fcc05da6e1d513d1f

    SHA256

    eebc04e8a66e3df433cace3f26c416fe1d3a53645cff36d1a32c43807e39dab7

    SHA512

    61a99ee50132287bc11dad22b62657024587df9773a48dde577c5a34ef2dcb96d6ee46a4afd540f5ddd97d1714692cf5487db1062e01e72fcc154e495952a515

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b66dce1e12c183b6783565aaa1007664

    SHA1

    96a367186540074949ff832e350ffa326c6a947a

    SHA256

    780201f24eb375ca91ead6d83a22707b48191c02d33dbfd7770581c13fdb6ef8

    SHA512

    8ae46e639eee936c0b36cbe04ebd6b90cca5028bafe7716177d4c5089a51ea3ae330fb01388bea5ed0cedb2c7b9468280895eae2b1b68fdba641ec3a0533c2f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8185e235d3f0086413c22e46670be6fe

    SHA1

    52d04a9e407768391a4d195b4687e11209e50f4d

    SHA256

    4798ed1b2d6ce1c4018d008227964dd5b113570b28cebfc8c9417849bd0866c5

    SHA512

    30f1b34386db776046e49ef0fd215721d4f0e47981dd86417df310138f61bc83973e22e9feceb4823a5c9d8b82e1f2f8d4ad18c7b0b334be0a447303a7ead191

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2705462fe30e8bba5c22249634307caa

    SHA1

    53366c87396fecf3d26148110ecf20569009a755

    SHA256

    79f53f2bde4453636281d5e399f41a37b891159797b868fb90a57e3a508b7fda

    SHA512

    cf21794738d683bcd02419fbefb5554f6bdad94285f5f1076bbb7e4139d3f339d43fbd03dc54d8c4daf595507c268bda6faeed302fd3f3762d8203a813092859

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    458f769e1aef265f98501a594b8748d0

    SHA1

    b753757f9d9d30547377dc5c4392298c87d1103f

    SHA256

    b735428b7bef9cfc979b1a6a3f1c11af87b89d3cd10a18d30eb3361cf59611c8

    SHA512

    87acb0f82b08229d8534a4dbbcfe9872433861efb6f8b9d4f7a64f3767111e26f356fef26b338e5085adc3ecb06125547a5e3dacb3860d7d4eb60cd9717e5a89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b2f0d81624f595f7b5c2ad22ee91f2f

    SHA1

    b4011f13e1e608003e91a67b827d1f9272c99199

    SHA256

    352e0421460ce39e2100107a206a43d3ac8f90f13a048a476966270d2d1d9701

    SHA512

    133fc4884347389b4b58555ccae8abf42e9a96fbc0f71ce3ca4e1bff6156e495620e7307de8d6113b60da0bf68c9bd8cd1f1b895ffa6c4f180cf427e1b2264dd

  • C:\Users\Admin\AppData\Local\Temp\CabD694.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD723.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1628-2-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1628-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1628-3-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1628-4-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2424-6-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2424-9-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2424-10-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2424-11-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2424-13-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB