Analysis

  • max time kernel
    121s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-11-2024 20:41

General

  • Target

    7915d21ad3cdbea4f56e4fbe8455583bdbc78113072931efb4d9f42de6efd61a.exe

  • Size

    692KB

  • MD5

    76d2dbf61c92d238f4795050a92e3ff5

  • SHA1

    e94eea3aa37c54e4a04bf8646b21c2f54a6ea4cd

  • SHA256

    7915d21ad3cdbea4f56e4fbe8455583bdbc78113072931efb4d9f42de6efd61a

  • SHA512

    0da3a32a856e7c22fa031e5bf1ade78177d2b1c7854d9cbba163d4a74d7af22018db010d5b288ebda4a4ff1528e38b1448f5fddde85a6243ff89fbead45e0a84

  • SSDEEP

    12288:q6f13oK/cDVrSs0SYnI5M/i9gCJ1y0Vm1uIf59UcudQM9zU1Jok2fP4VD:q6ftojDBeSYnIO1CTywjGzh2

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7915d21ad3cdbea4f56e4fbe8455583bdbc78113072931efb4d9f42de6efd61a.exe
    "C:\Users\Admin\AppData\Local\Temp\7915d21ad3cdbea4f56e4fbe8455583bdbc78113072931efb4d9f42de6efd61a.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Users\Admin\AppData\Local\Temp\7915d21ad3cdbea4f56e4fbe8455583bdbc78113072931efb4d9f42de6efd61a.exe
      "C:\Users\Admin\AppData\Local\Temp\7915d21ad3cdbea4f56e4fbe8455583bdbc78113072931efb4d9f42de6efd61a.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1332
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82cb4718edf24059c14e7384c46dfddd

    SHA1

    1d5a5d6dfe781d4a1a688f3721a32c2657adc1a4

    SHA256

    c05344df3da6ffe2835497ca49390dfd6aa566c4a556f2f2d7e828fe22d53577

    SHA512

    5a8dfecad5ee410a52529c1453fc3d95b338e48f6d6df9eaabe48cbd54aa43ecd8d8f5da0a70b0346de10ac02b74d566a57e0629608059810c482d01ef092c4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec69384c44998d3ad34f421e6adb763e

    SHA1

    d50da8f9af50a0912a4118231b828ef6797a24f8

    SHA256

    553e9eb9b9002053e9bcb766ff8dbab3e00ff069f4bcf302cb355ec4adba4842

    SHA512

    ee591a4baadcb976274193def25d9f4ea4db3d14f695bff055b910593efa99cb1b14c05bb106be12ddba47f185b788e910d575d4b621649670b20efde08edd6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4019802044b28a246ac12d37145ee8e2

    SHA1

    1f7a9cc9fa7db1a31da32ede422150f18c3f70ab

    SHA256

    c8779eb1c20c2ffb29a31ebfdba12089f1e9ecd0998c74bc32e9876983e63110

    SHA512

    bfca860f08955f09d89d47ff84b6a7737cf36ec2b493ef6f989a2e33e56b75dce171c15303fb14feb60c75cfb5be3d8d8d68ce604dc8f18132dbbfef730ea40f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d65553e990a4fc1b8f854ae78de07bfc

    SHA1

    ee06f147a0a6c8d70603e6bf3c82db20ef5d1d5f

    SHA256

    85cfa020eb92a3b11ceb37d391dcefa4b33a974d27dc2f9799731859fa06b82c

    SHA512

    1a75fb2dac8016ae2e8c280fcda70bd7bcf1a1bed9db9ce26de5a31d218c55246deef1d5f30415c703b5d8576291808cc5fd51284c6f132d3720ca912393cf97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d86826ba277409296b5bb1439ecc7885

    SHA1

    e8111326de09b0d78f3cd99acf88383a75b912f6

    SHA256

    cc5a31f21ee118db8e693fe521ff3e011398dc47757c935650e2a5847b8a9e6a

    SHA512

    236fe37e769b8c9c260d42709a48be50f52428d8a883a1131c5232353f26d87d045ed5e43feedaa9b01830c6a1ff937f8a0a3a49225ae91d5a032c701ec8b7ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67a8ddbc8ffb888f7310551ef1e27daa

    SHA1

    f37e62368c276087b9e4996cd4445c5505ef3190

    SHA256

    49d02a67176000ebecf97a3c294ecc07665c3ff0caa134257d5d686bf3046250

    SHA512

    c35eedb8d19f5f61beb4ae5cdefc9e2413a07b3fa1a1fd02e3566223acf28d812953d199e160dca171a6172f2971c42135576e5a515a8c43470ec3aeba760135

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8b8653a29b0bf1e1f18d0507393f661

    SHA1

    74ad7c367de46f11115dcf95161386b62e030183

    SHA256

    a91e0509b2f9542412f7e8b2aa047c09349b2a869ff3be9058db072a34548341

    SHA512

    0eb0de81ab317528721b80ec9f94a704d232732d476ec4769f6c048cd5fbb2f60602e7747501b2cd6a24589388507744219ca25c1669e4aeef3acda278cb4c4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7d0a709579df059d93c68b0eebd5988

    SHA1

    d3bca37f7936d4717dc3e644a5678ec92090e4b2

    SHA256

    00f291d61e95eb45fb11d4aa9cdc04aa618aa0334f240cd2146327eb25de17b6

    SHA512

    b963c31978d7e96b62776322a107d7972451101b0fba9aebe56fbbda671fde9f8f5b8f50263f5b76b65f9b42c390d592b9f93dfc620029436e379103c23b83a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc2c4104324c5a66150be219abac44ab

    SHA1

    6d70a6fafc3c45e75ce66bb62da886018c432e0d

    SHA256

    18ab43892e220a17442122c4bb640ad04ed94b17a7ad5076872a9a2c31fdfa86

    SHA512

    f1103e261278c3601ac63089315d56d57351808408a68b266017c00b83670b6c2545b8299c19daef54f838701572df0810a9319fc9dcaabe813a1aea5746c836

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0eee1cc908ecf05f71885d0f52f561ee

    SHA1

    575acda3f1c0bdd1230802697b9d22990ee3e1ad

    SHA256

    c0502a968a82a7bd9ca3389cabc1f43d4f432ff2060128011700bdff0b84fa9a

    SHA512

    0813e4341db6f18ebac17737c2d1daab68da5a90a0763519bbcf297f7075449a2a871ee717a9a9661f66a34a65287cca914e2b018dd5c01bfbc0a88f137bdf7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35a15c36b8cf8d53269af6ea7a775aa6

    SHA1

    00528f5157a3b35f51a9e1bcbf3d6e773ae0a120

    SHA256

    43fbbbc159494b8e72eda042b9e7ad673d6350bdfd916ee3f24f7b6a29094eb4

    SHA512

    aebedf5a0d41372c12e880a6195941dbb1ffc405484a3a00490e5680e41e55d675f083929eb0eb29061577f09ce4c79ddc92055f95f6de6fe1d1de44d3676fae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6a34d2dafc1a81665b773a60a3b74c0

    SHA1

    2bf69c2319bc106a3ccd66e02aa5910591dd51e0

    SHA256

    86589da996e5f7eef59f98102cb77fb7c831aa430fef81faed4dbbad12e7f0ea

    SHA512

    e42873414ccec5666029dbf30fee52c85869f312b54efc95aa7fe7c72c4067d8e445d1990b9edd9a068e6123381f48e9c57535618b7e309022ec0002ba65216b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    760140ff68366cae43682ea7938053d5

    SHA1

    f9d6ee9d827fe7ce466dad3f256f9e972f37b8fd

    SHA256

    145918686948fc81383b915ecff94a9ec6470b5b86b7fbaefba4fddcaad19238

    SHA512

    9d469376339c1164a794b544ddaeb17453bb3547931ea6effea1975b3c2d64c3bd2f685a3b0b44a2da530c4aaecdfbbf855fa63129b8b39b305c3396e29f4daa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8905d0cc2c6748fd06a594a8d53b8ad8

    SHA1

    a6f209abedf85df2c0fdc2864c11fe4ee9224243

    SHA256

    7c4792511ea182039ab154ee89b4bcb29921433d4e94d71fa5aa8fcdfbf162bf

    SHA512

    7becbb9eb4eecac025d1af9fb159edf297dae362d8402f2a05903e3f398ea030e5ccd16c0c5efc1f394377fddaf3f4e769601e338b2315fb50756a4a8c41730c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f52973d4b05426efb3a555ec6d0a6c4

    SHA1

    ed52a3289c14bdc973ebeddf0fd6e8976b583f39

    SHA256

    deef08638969b18b67b15bb92a2ae2d08359a6bacb4dbc8679a481d40d2c99cc

    SHA512

    e0544cba4af6ad0f2e39366be4e2152e4f1107ca313b9d0be591b2f9011b9bd0b3d973d34ba637e9430a8316f012d73f288ae2fa9c1cd71f02b54de965e065a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5bf114812a99e75b512f9201b59974d8

    SHA1

    d71e99df2fa3a166d0f3a06cdba4798033bb82ab

    SHA256

    0c4f9678045ee7a42f2e7d7c69e6c40b79551b0c96deed8715c8492f06631c18

    SHA512

    54ed2b7d3f3622b8cdc57816431fc0f2cf6ab495e1fd9d2b12a665af854a25b6dc21f2cfd19fd23ab3caf032fb308d22fca8e1ed88b99cf02217cf936509400a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0b39711e1b93ca586271bcf5573281b

    SHA1

    60d52cf96a72e33b55946a1d6898dc0cedf72825

    SHA256

    69b161e668040c260f29ab1f795a9d0b99e8d54a0ef5d871f9ec2361fc30bd30

    SHA512

    fa549f42b0be34926e6c5f0fe0a1b9e1e4dc31cd3799a3b1bb3f1bd9ba94f83c73da786486daf674bca48debc1975cd283b4543e255ffed54a6e09afba8abfd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b7079a5cf9a68f06401c7211d5757e0

    SHA1

    f1cf5ae7d4e1e6906051a6f816fca55acf7243fb

    SHA256

    deb43bfa2f29f0c7e5249917cd2a171c6f747ffb23d14de830c8798104b18f91

    SHA512

    ec9b3f8c4d7929c367f5b787f7889b510d9a0cf0ad594cb8db50c10b24b4184e87b8a9955eb98f49d294b8870fad0e007155726062aa5472b878df8ef5cf9c6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d59cea10bfa95f4fbe5756480f29d4af

    SHA1

    dcb9c0832eb4249f358b1f0a5bc824de17a87dfc

    SHA256

    c953b71bba035442a63ecdc2486ab691ad2faf5c489d8d9f3f8fe2387335a382

    SHA512

    e7d4e5d7c3566a203ee5ef26d9d6276d93aa79e75b7045e754021a3febe47efff83fd20729ebde03a2199f8e52b9c59454304a6ba24c9be1c272c29ec7d256f3

  • C:\Users\Admin\AppData\Local\Temp\CabA3FF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA49F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1332-15-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/1332-22-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/1332-20-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/1332-17-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1332-11-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/1332-12-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/1332-14-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/1332-13-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/1940-482-0x0000000003790000-0x000000000397C000-memory.dmp

    Filesize

    1.9MB

  • memory/1940-2-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/1940-10-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/1940-7-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/1940-5-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/1940-6-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/1940-0-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/1940-1-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/1940-3-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB

  • memory/1940-4-0x0000000000400000-0x00000000005EC000-memory.dmp

    Filesize

    1.9MB