Analysis

  • max time kernel
    93s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-11-2024 18:33

General

  • Target

    Meeting.exe

  • Size

    523KB

  • MD5

    67a74b903b55c8f76dbee43f52e8b792

  • SHA1

    1bde798a60979c794661fb1a13a8529b18494d5e

  • SHA256

    6e701fee29587298e88a1bce88b9ed6f2c32e29b0284762a998b6267e0c63f44

  • SHA512

    8c0499279a4057ac1ea2e465e8b2ea3c97fabb040ee20366fada542178e0447b893d9ff498922f054e1b108315e3d65c6e34434f3fc0f4bd2f4fdc2d8a6f5acf

  • SSDEEP

    12288:wyveQB/fTHIGaPkKEYzURNAwbAg6cmAmqb:wuDXTIGaPhEYzUzA0LmAPb

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

89.197.154.116:7810

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Meeting.exe
    "C:\Users\Admin\AppData\Local\Temp\Meeting.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Icon.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Icon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Icon.exe

    Filesize

    72KB

    MD5

    c636e56221d09f798499143293e8cd6e

    SHA1

    bf8e94ff385efdd82edb98078cf52679b1151187

    SHA256

    10bac2bf918ba5e2bdfe7306c23fb97e76e78092c7ce0b5dbe3b9a17ba38e5f6

    SHA512

    2ed6d73356dd753009f603a9b2b0e9f38308e49d1161513c8951795e40f0ac33b732b26fcc6aff9788b2b56e661456bb7d1997f1cd6e2af6dc527df3aaface24

  • memory/4252-16-0x0000000000570000-0x0000000000571000-memory.dmp

    Filesize

    4KB