Analysis

  • max time kernel
    106s
  • max time network
    106s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    09/11/2024, 00:16

General

  • Target

    27c32b7b8dedee495c8d1a9aa05d954f1460c2093162b14b5ffb7acd0127f6f2.exe

  • Size

    1.8MB

  • MD5

    c175db9d6163912466ef3cab0b2c4fe3

  • SHA1

    8c93569f3c2d79c2f414e106aa9ded46cc63c0f8

  • SHA256

    27c32b7b8dedee495c8d1a9aa05d954f1460c2093162b14b5ffb7acd0127f6f2

  • SHA512

    544d16e9207b7c6704f1abeebe18cbab542c743d5ec56db19340ae25fdd655d7012615177ed1700cfd8d48bb46ef164f23c34837be96d49ccde180d225222b33

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09MOGi9JdLegMZt4zEyje0sMsvjwC/hR:/3d5ZQ1UxJhL2h0J+

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27c32b7b8dedee495c8d1a9aa05d954f1460c2093162b14b5ffb7acd0127f6f2.exe
    "C:\Users\Admin\AppData\Local\Temp\27c32b7b8dedee495c8d1a9aa05d954f1460c2093162b14b5ffb7acd0127f6f2.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Users\Admin\AppData\Local\Temp\27c32b7b8dedee495c8d1a9aa05d954f1460c2093162b14b5ffb7acd0127f6f2.exe
      "C:\Users\Admin\AppData\Local\Temp\27c32b7b8dedee495c8d1a9aa05d954f1460c2093162b14b5ffb7acd0127f6f2.exe" Admin
      2⤵
      • Enumerates connected drives
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2816
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5726586510e1ee72b9abf1ddd219062b

    SHA1

    c82af0ec22cd303ce752097a7d71d4ebf568e6ec

    SHA256

    387c7742ae565b7faf4d33efbba459ab88688c5092c3418cc0b94c9004370b9d

    SHA512

    d2dbbb801c975f104dd4c0044956ca4a7e89f9062393d4441dcf1a165f688e2cea5a54ebc782508cd667e722aa26bd770d35bb0bb54d352cc267ce7a9f476630

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7507dc810405db649876b406f70bd4d3

    SHA1

    d392c7c5360f75d601c67991ac7013ec252be173

    SHA256

    eca1f332b119e5945f82287017372b8d8de2992975661668388c0c97b7d687dd

    SHA512

    4aed6d79ef790ae9e8023a47cbfeaf84d8e3856aa5c9d9a0b1fadd995e1e04feaa7df02f65cee8a1a41aa56c8cff5950f429b48aa6fccce57543905b1b8ddd33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b84c194d5f4a6bf979e89d304c57aa40

    SHA1

    25add9bf9b25812762467c0fd6f1164032360c3e

    SHA256

    59392220092f6c2dea27cce2298085275a6086f332b4cc0a18a0106a5b015f60

    SHA512

    18d94c37ab6a8de579af47a52969ea43f65c6192f1ada394cbf6bf89d19c1114a15dc987fbc01a9f2eeb29ae55206a11728c2db2ad0eb2a2a9cf06d71fa77aa0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a02aeb3e672f8f6f3c240a57028e248

    SHA1

    71ae01fb400ceff33f4dacf99e82dfa6f7ec676f

    SHA256

    d41991e3775593614316579109331036f486c5b3ef6628abcbbe3bb6f8c34bdc

    SHA512

    0b1cdd9aae898f441a6b0d13aabb574a766114ebd4d97175f6d1f65140d30ba2cd2a33ea7e088d3af3db4757f5ca73f7b30e118a405ccf4543d3ab67cd6ca28c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a8fd78e45659ad83490cf7b5d5c9143

    SHA1

    d0589ffc51a8862701be4c59ddc63b67d9fd26f5

    SHA256

    a58e65720b1bbb79d9c83cf6fbdd6f8015b14d3313fd6b26d7adc326de765ba6

    SHA512

    c7ece3c1060e03025f57ba943635029c202d5687803c6c0b2743e7718aba7eff07440f5cedde862ace6b1f8ca282e07e108765b355e17e30094adec23e1d148a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aec2347dabf4e48ed026b65e76ac914a

    SHA1

    089e1ef6b4455f416a2d79a59c58aad9015589fa

    SHA256

    79c279ab9677af108528f9a9e875f9c80512155690ea3af07ca37dcb78bd5d20

    SHA512

    4bafab3b0f477cbc24d4a7d8d0b47a5c43aee512c6d18e7bde487a21aa7f858fd35f4602aa3b84be24bf871fd7632de7838e1137ecec28cce0aee0e59d079e03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f752073f718fe2d6e4baeae294d5fd24

    SHA1

    056e85df654b4baa36e44c2ff5d9b36693f4da08

    SHA256

    1399e934d3b5db6426a2bf0c61cfe965560157d25559fd4723302bf6e337e285

    SHA512

    b098e1afda1f959209d1fd9baff47cfb0cfff78f20614f90e2134a5eff64c21bdbeae4649cda199419dd998d7eb1d295ae296e8833ff170b62103b2a64d9c952

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93556a370ca800d7903bc8c9b3bfec55

    SHA1

    936f7c615755ae638becabfc13f3e6841a2ef0f2

    SHA256

    de36acd0d1024686a1a607f0cab33a90c35fb9cd2cc8c1fca90f7c7fb2291472

    SHA512

    fd24ea638b7ab4a9838e68bd7c4035c9bbcd491460d572d75ca99ee933285a16b85fa616d346ed9819458bb4a8a8bf4304fd8892372b07c1d3ba413680620893

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aea20ef9d704fa8d8d29e4f4f626eba7

    SHA1

    2e050f640f2d4e710fb53aba6d3a4296f7c585f3

    SHA256

    99b146b8925c03d256ee35a346d2e284241ad26c5bbafbe0547769d1e6834e75

    SHA512

    68f48e58c3da4eb734630952109d66995ae9fc36d8c9ecdff73bca05e7b69074b00f7f937804389304427b7f8d0e1a1ae88b08cd5b74114422c7dff6f4220b66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab15ac0ec73d0f42e526cb527f2df1e5

    SHA1

    67583645134bc50506474c6da5ed83c68f81765e

    SHA256

    12f375f2cbbd173357430cf00ecb33393759a22637a857efeee51987dafa0506

    SHA512

    07a96cd820442fefafc6c848ede5b7ba3eefe29d53fd093d887e1708997d2a151ef29bb60be8d8f0614e06e73fbb409c7a48b1e47a3525717be615a5a38ac7d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dcd7c0efdb1037f11549bd64556b65b1

    SHA1

    f6ab8e3c49eab96d9d34e3abca6f601c52dd6025

    SHA256

    1b7db834d4c689100573b14577133bbc7ffced20143e60b07789e91d5abaa025

    SHA512

    2bb3c7e4de07f563960e36a46a8eb73280031b06a8cdcfda0ed660d10ae412871f859cf0f5f97763fab5ae1ec1c587f5a486e950734d6b2cf32a0d0420b9ed0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba260f12ff80cffb2d39c714daf33e8f

    SHA1

    5e95fad904114627a8aa442548877b3f2c5a48ae

    SHA256

    f9880e068e7d561aa2edbcb62d5b376f5fd21dad59690f105459fdcb28fdb29d

    SHA512

    515227d996b2d232c47fd64e38f3102fd29c7f4375a69d1d81442ef7d5739723e266a404c3af25d51138d04dcdd66dd3b392614ab0d28f7f7936100cd84d83d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    883fdc8e6c9277639ac346c6a25db6fd

    SHA1

    eb90fd3586e4fb2076c9e01662d24228566dd853

    SHA256

    b4059880a7c93ab155ed9e12d9723937b286b20a01b74ee94d9d5c5e7c871fb5

    SHA512

    c05d6e3fbe0a4e450f3c9e784df6495512ed5e1b56306c159806104f8f700c0c4bfff61b321e5cb91f366214ee0a675bd2710c2534ba11d423fe50f087cf819b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bbc41a0d25fdeb5b9756d69ab359d974

    SHA1

    1932b6ba39a9bf3cd733ee1da5c92f125c969a14

    SHA256

    48c688485cfdd9f845e47a2567c5716fc76ea7880257d9d7c9852287ad997155

    SHA512

    0b70d2c1833625794f0ae14416cffd7b74e1f14f511053a21e55068c9478a49a627ca81e66c938f49574ce6c3b83231b8f0f23aaf324bf9078e39f2b6e725d4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af60bb322a0efc4a7d06d4918cdb54dd

    SHA1

    9fc3394bb415cc0af4052f7f19a84a4b518a537f

    SHA256

    e6020a842d5c7c72e89eedb8e8d8d6f12a446c6d881c266a7510731b0bb366bd

    SHA512

    869738c487b570d1e250826564b591f89ea9a8dd8601e1dde65515452d872bf09ade561867c38e66c5dfed8ea78177e2776c967348d8adb01248292e993e4d7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd2efd2423e759886b48e309cdda89e1

    SHA1

    1a539ab8b80050bbc05bb6a91205a1fe73e595a7

    SHA256

    b21a6a2beafd2ce8c615e5f166588b0c063983e8620ebd6c7ce837f22d909ac9

    SHA512

    36f007e623165156e6b947f958c01b32b5c6c92cee1f7ebeaddda569443f8bd7503057514902811cdbf767fadb230b2c7a07f394060631039a62e5b3c7e8e587

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    051510dec6ce3957585286ddc51a69d6

    SHA1

    1e2cfbda669d3fada40d443115cb67ea4bbb2a0a

    SHA256

    a6e5a4b693d963ebaa3f8b0757fad3f587379a24f1b884c9df49c46c5c5dcddb

    SHA512

    ad65e603cc94d8d392190c478c3501dea251d191f3cd473e9e021a6620d5cc5545be2a8fa6b449c0dbb65a04fdfec4ff738d311747fe859ff818ecadc9afbfca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5d72c54aec4dc5c620ae923a9574466

    SHA1

    cedd01c512bca0196784d2f82990aec14cda7c2f

    SHA256

    45e0961d02e988dde175ff0fec2bc77c1bc3b68b818e98092704048aecde067c

    SHA512

    54a0cd226f25ae7ee8db5e1c5e564ec9010d82289b8daf5f76f025b9e6ab9d3450f39c1fc33f53a10101379c896e6dad233b889e21429798b1c019ae3f154107

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0521aa3aababc1eb7e623ebb5b856385

    SHA1

    813ae63720a30b3e41a6b6e91b1403ef2b64934f

    SHA256

    ed40f8244735c45a46f440e89f915f4807b42544170608ecd44c917b426ff2fe

    SHA512

    48398dd81a65e11646ab140c837257dcd657ec28f0f9fdc68c4934dd2e19579da81567a5a95a8ac8029a87882297a0344ae172d39637bff5381fc465ca7f5ff0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23e33bfdb1899b15f37647ccf1036f45

    SHA1

    1446705eac8e12ba759e80781f8f23f755bf2d0d

    SHA256

    cfd1313fe83453fc8741ccc82822bc8cf0ebfd7aa1cabf9f75fe2e49a0940a3e

    SHA512

    27731534387fbad6658719ae89781aee0ce6b745ebd241adfdf0a7fb3d11e3fcf63c6f566757d75cc0ab2a844d6588ae939d3782799422d67fb7d19dc8ad742b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6c8f75f432af4fc0109e45ff0c57a30

    SHA1

    4e89836a58b95476b7f7c9eca351188146035a22

    SHA256

    beb342db5f81034fe7a604e76eb107089a7f69462d5b509641581b10088761d1

    SHA512

    c4f3d5e224dc626fb147f311f4bd037987c3a947520a6d942962a4ab48a780843902982ad27019f479d6b4c4005df6dedac1f35a84cad92223da13f60e6578f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b28914ec30dd6dc376d1c8f04c76c9a4

    SHA1

    f917f171f51884b6c3e1d44da33b864ce8ec40df

    SHA256

    1aa58e0a8615230ecd890057951592b87745c3f222268cc2d3ff1cc19ddfae97

    SHA512

    e4e30b0a811c7167293bc5ee5bce02904cb812c9005abd5c2cfba5d77114234ede6bfbbf9006c438c83e155e101e14d5a0ff459bf233d2a2fb11c7b6c15f1bae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2268d057c39b619ff063e40f41af953b

    SHA1

    88a362e50611559ed99730cc98df8466f0070a73

    SHA256

    2d3fd789ebeaf9bd3f10d67d38cfe38e8f98d0dae996c6eed4059c067876ed7c

    SHA512

    0cb87b3e6f570f19a4c03b5a23b4abf563cbbc12248e7075f9ef05752479cef9029e5081526f4187087045d3a4c9263a6baba4dae87305fd633025e531bffc63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    446317b0383f26e5002a13fc536dccdc

    SHA1

    4165710b6ab058cb731a183438a9df2d4f994561

    SHA256

    9bf5bfc27bb90635526cfdb4e4bfae4723eca881b7173f58127a048f4a090854

    SHA512

    df9d145423b15021a4fd19ad582c7f3a8b45a6facccb2c9043bed01e567b6112732097b795b661e9c7d9d18199a88b420be3820213c202877c8b9e5b9ba27465

  • C:\Users\Admin\AppData\Local\Temp\CabA50.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAEF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1820-2-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1820-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1820-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1820-4-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/3000-6-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/3000-9-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/3000-10-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/3000-11-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/3000-13-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB