Analysis

  • max time kernel
    121s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2024 06:14

General

  • Target

    990b5856df628abab556453e9e07b59f6887dd9d8531c397c98adfdbd34afcab.exe

  • Size

    1.8MB

  • MD5

    b0b6a178b5e989a27cfcdb5976844855

  • SHA1

    2991fc5c8f3a4ec35e5d63178af1a8652c02265a

  • SHA256

    990b5856df628abab556453e9e07b59f6887dd9d8531c397c98adfdbd34afcab

  • SHA512

    44edb2c79bb1135e51bc9624cdce208ff7be2932583a7ef7ba851c4b6f2defbbd979ee92b36d820a23b28d62d1728f4a84fddc323f0859bdd969b8c9c8b10f22

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO099OGi9J3YiWdCMJ5QxmjwC/hR:/3d5ZQ1fxJIiW0MbQxA

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\990b5856df628abab556453e9e07b59f6887dd9d8531c397c98adfdbd34afcab.exe
    "C:\Users\Admin\AppData\Local\Temp\990b5856df628abab556453e9e07b59f6887dd9d8531c397c98adfdbd34afcab.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Users\Admin\AppData\Local\Temp\990b5856df628abab556453e9e07b59f6887dd9d8531c397c98adfdbd34afcab.exe
      "C:\Users\Admin\AppData\Local\Temp\990b5856df628abab556453e9e07b59f6887dd9d8531c397c98adfdbd34afcab.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abe2a97fb9a51aec59e6868bc2dfa6ba

    SHA1

    107bea5ed6e21c26a71922f7e80365cc3fc63550

    SHA256

    db18a5780936e9217ddfba6e2b1175a005f26c60d9cda0a457f7921d61ee9180

    SHA512

    5f8ede8f2d6fa620e9a7f2e6c10700b2f9f88e21f2d7c2100c0368eefe5302bdbe7565cb7c561f768f68120eb1787e35ac925f4b11770738458c2284e3fdecbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40152c975d6c12822b15b22b6fcbe45c

    SHA1

    7e49fc6647274336c2262157b47abdfb9e10a997

    SHA256

    746a8043d2e3099ac129d228ad0a6b7f6cfc1cb3dc3ebd6a9f23d7cf31563f3a

    SHA512

    c7577d3d2dc3e33c239ee3571e0a7725fc468722e92166258430f0f695857c3db6ca9ddd10ff5757c34cdfd08a9a410a6d0b514d335ce24b18fc02b3887bc3de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce060ca9658bd6c136ebe9c47afd9e76

    SHA1

    07dd297421ff79255cdff4e64d0bde26e5305b11

    SHA256

    b901a3676271e33eb8461421b9376f7b57e3e7025e04c2fac91ea23489cd5bf3

    SHA512

    7709154f0a042f2000f4cb4b6a0d951a3d0c3a13f1643cddfe04098d76fd186e40624d4cf072b90eeb8079fa83e8fbc23a9042b4350f7440b8505c3714d9551d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a50efa7409a665f41c15cbdd870f4e2f

    SHA1

    3c92ca1855e787feded496635730ba5b30f797b3

    SHA256

    4c3170c659263653e2ab68d97dcbc7a9f22a606afe007123926e80076eefb8a5

    SHA512

    17602fbb321eb84fa4bbff41d79660ef19e97aac4e3527ef1dda46acdafd1631d044fa240b275ec1a10b8b67dfa213bf6137bdbe3e9f2d3e68123215a174b46d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9c69f7f6cfc3f3228875a7b4ce78672

    SHA1

    1504ab2db8605d035d15e22f118f2fa5271a878b

    SHA256

    f414c64486c66be6614040822b0c4099999477e35eec530454df47c310c1b447

    SHA512

    53079a0d2a0dafdc465939a639e28267cb1dbae6a0108b986bfe9fe2e2f8382c331e2795a85e8143f6ec882de847f22b0b35fc811a75ab61efcd72404304f25b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ff094621a30a04d1fa1003502495569

    SHA1

    3a3a8d876ee4aa3738a6b08aa8da864566b57be5

    SHA256

    aa79143e2b43485a035084b9285a65fcda4a0743e5b0d0ea788c62b089c71eac

    SHA512

    7864b7dafa6cb2f4a5c8a179f0707600ac2bb827d507cb042c139432fc92b794cb144d732c8fd569a8428f1ee14ff9bf6de73bfda393502e5da5d178ed5064c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75476bd6b935c0e7bc5754ad228ddade

    SHA1

    1866ae4a5bf190b9d73431d456083b01eb477640

    SHA256

    ed277e1ce6d452882c76dd6b1a967c3674ed5888964c2445d11ed053798f9300

    SHA512

    83411abc0dddcdbcfdad2e09a9ae320e81e2a422e5547e0326565e7b0fddeefabbc81c6f274d9272c59163f203d2d5922e07c856731c2cc8fa69658cdb85ef56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8f6145cc5f04888e747f5fecf5c4680

    SHA1

    da0124e76418dda5c10b79832301837c6c6a9514

    SHA256

    63ba78a1b7520aca050660f028bf38fc7b5aeca93869f4b2bc957ef6a7106413

    SHA512

    a272664db07031af805dcd6c320e08d2f0383973c2f1e5bd90ccba741cec350aa1cf3167e2c42056c0b7fc4477683995635837efdaaacf2351b6860fe1daf7eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5655979a9db6538e976c9528b0c0bec9

    SHA1

    6fc9cd334c995e8334ad141f5c003049968e7582

    SHA256

    4fea8c8e83402fb3bd63c64dda6db9309f84b9b95680c6bf2acd23b033f2af6a

    SHA512

    32d9f9c66fdc1a3b71a39e04f61a9679032daf43b69f73e2d025d8936c8a07d47a876ff1bcc949a28ee92d5371082603de3ae0117f7b7cdaedc7af471d67ae51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62ca8586de7d861a96f1736fc14f5982

    SHA1

    38ffb365b5ee7cbeed8a00a4c95f128490d674c8

    SHA256

    472a430efd02d043e34c2a3f9977eec3a17acb8e7e79a772fb5e8de2950f11a1

    SHA512

    2cb4511254fc0ab88069f0042f9e16a3bb7cdd51f5793c50644b29740ef800d513a08c0baa6aa5d84dafb83664d92142f999ca2b7c181cc9fc017b94f6c3754a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dbae838ed9bb73bd68ea9e004c75d395

    SHA1

    833cc4bca89a3665ecf54378bb34a487d12153a3

    SHA256

    0fdea3f298f0d007466889c2e6636677a42c1c9c06484236cdadae8053ba72ae

    SHA512

    8a61f2f1980f80c8dc4c434179ac91f1ddaaa490cb98a746b3dd21c686f85c82bd94602d20608ff7a953cfda7aa6f72481732f4d36d68b5ce63426ff3856e80f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    653b8187e4a86dc975aebc21f58a6f79

    SHA1

    316f5db966dce291868a1fc3ec2a3103248efbe5

    SHA256

    9412a902239c79a04cd3de7848cc9229faa688499113bdabc2b748bcca92a926

    SHA512

    e600ebef05ca18d091ffaafc5e70ea067cc6089b6c8debebdfa7356fe35b75b62e86e549bfcaf7adedb690f050dd27128240f9b692ef285c8dcce7641a385062

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9153aff93fc7befc5166521224c3e6d3

    SHA1

    606d5dd0c08525f99c2be5dcc31ebced24f5dae0

    SHA256

    5f02c48eae26a873f13b5049604737a8089ddae8b4852dc9e452167029a94190

    SHA512

    cf31ad7a312b653ab0bd5775b5e5a19ca6115cc068cd4f2edf6c307ed761f2962371d3877228e7826fdf355c8eb1b99d7365fdb2aa068af41b3e73de5f0c8f96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f4a7f3afe78aa411f8fdf7864c0623a

    SHA1

    65c4af1a32af72596ad72fb759a21d2a88923615

    SHA256

    360d375737a109c750719c076d085eb2f9cd1e69090213e41f6cfa0c45bcb058

    SHA512

    70665fc1590076a1f90ac7f77585425fcc352c6d0b4d4deb3eca039ab759fcc1f1fcbe501d28938e40d3b6c8a00b8fd2d54329b7e3fb654649970d46cb1c50a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49d4027b89441ae8a2fd2f516a69eccb

    SHA1

    f33c06126002111ef14e052af65ec5b6eaa0e46a

    SHA256

    1fdde650740752ce36c01286821a00e56bcf7b0d0d9f338dcac413a1d9aec454

    SHA512

    d0174e94d64a5dc9eb2e5058f5b37314c8e6c48057d8d0c53f54e264fb4b6ba93b62b7677603295956b3f88a800cb1a24de96b74e1aa17b2c4fad8ac194e657c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1bad92e86d07c96703912f1f599ada6b

    SHA1

    280948121badb44e5dc1b600ffa8e3ce5cda124c

    SHA256

    837313347e90694cc71726e2e11fba606e09862b4efbc32760834936f9ef20c4

    SHA512

    aa11a7df581f282f5e80a8b7f39ffc8a6cb029ed35e81c891a7525d76afa9206edc0d084ab0c1710a28846cc6bd9205cdca8601442deee5cb42cdcd1e145f23a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e8730ca5d09be8aba1327459b9fe7097

    SHA1

    c6fea4f6da9bbebe9a71a2ca8d5cb0f638250b93

    SHA256

    cc538154dd451adf6fc92e7ea68ac90507a706b263470305710d39a68cd1002c

    SHA512

    62fa61623922f7f602b784343ceefdd519d46d9313fd5df6ace9a7c25fbe4fac9584de8b01593e01177bf90bd2974658d99fb6e77eb22d798d8e52b06e114fa1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9bf7e133f6e4bff9aa57bf857c29817e

    SHA1

    2591d3ceb636d3e22b5c23902f121956b3a2afcc

    SHA256

    f2fad0d4b4bbbaf57b15dc9a372857546cced087ca33ead42e127acf2b6f277e

    SHA512

    960cec0943abce3e41def2653b0c024949aacdc3d2db54e79873578e08fe6b4f2b561d6b3c345b53deb4141c095e168d0d93385e2e9a8bd526af8e8844b4941e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5f701f9f38685b55137ded67e048f10

    SHA1

    8334a56fb4de859af043f213d9e9cba8d19ecb19

    SHA256

    c67698c2a79abfd3ff92938f5ec83dcee6e7a451578e83df0cef2250c4c61d86

    SHA512

    46dfba65b522ee844911158cefb2e61f4e72775d24b2b16dd16344617de0a33d8312a40288cf401affa9c2885b82f803f5cb9473cf1cc0f3a7e71ff86d651603

  • C:\Users\Admin\AppData\Local\Temp\Cab9F3F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9FDE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2616-3-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2616-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2616-2-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2616-4-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2944-6-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/2944-10-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/2944-9-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2944-12-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB