Analysis
-
max time kernel
93s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 18:33
Static task
static1
Behavioral task
behavioral1
Sample
Meeting.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Meeting.exe
Resource
win10v2004-20241007-en
General
-
Target
Meeting.exe
-
Size
523KB
-
MD5
67a74b903b55c8f76dbee43f52e8b792
-
SHA1
1bde798a60979c794661fb1a13a8529b18494d5e
-
SHA256
6e701fee29587298e88a1bce88b9ed6f2c32e29b0284762a998b6267e0c63f44
-
SHA512
8c0499279a4057ac1ea2e465e8b2ea3c97fabb040ee20366fada542178e0447b893d9ff498922f054e1b108315e3d65c6e34434f3fc0f4bd2f4fdc2d8a6f5acf
-
SSDEEP
12288:wyveQB/fTHIGaPkKEYzURNAwbAg6cmAmqb:wuDXTIGaPhEYzUzA0LmAPb
Malware Config
Extracted
metasploit
windows/reverse_tcp
89.197.154.116:7810
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Meeting.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Meeting.exe -
Executes dropped EXE 1 IoCs
Processes:
Icon.exepid process 4252 Icon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Icon.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Icon.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Meeting.exedescription pid process target process PID 1592 wrote to memory of 4252 1592 Meeting.exe Icon.exe PID 1592 wrote to memory of 4252 1592 Meeting.exe Icon.exe PID 1592 wrote to memory of 4252 1592 Meeting.exe Icon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Meeting.exe"C:\Users\Admin\AppData\Local\Temp\Meeting.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Icon.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Icon.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5c636e56221d09f798499143293e8cd6e
SHA1bf8e94ff385efdd82edb98078cf52679b1151187
SHA25610bac2bf918ba5e2bdfe7306c23fb97e76e78092c7ce0b5dbe3b9a17ba38e5f6
SHA5122ed6d73356dd753009f603a9b2b0e9f38308e49d1161513c8951795e40f0ac33b732b26fcc6aff9788b2b56e661456bb7d1997f1cd6e2af6dc527df3aaface24