Analysis

  • max time kernel
    119s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-11-2024 22:09

General

  • Target

    a4cd0e33813af625d99cc838e7af738703e6550aab2a1f10c9f1dc06a7b4185e.exe

  • Size

    1.8MB

  • MD5

    852a36ddb72c31082efdec923784f13a

  • SHA1

    e746626691af3c9ba5040bd9f0567a2e273fa025

  • SHA256

    a4cd0e33813af625d99cc838e7af738703e6550aab2a1f10c9f1dc06a7b4185e

  • SHA512

    32fe501eb1877c6e451d6cda5b5082ea7c3e3d712becaaeef06e9af5e9248815c06c18b5686d6da0c682e3d50e24cf6fd6e6abc3dce465a530d9dbceb6acd9e2

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09ROGi9JbBodjwC/hR:/3d5ZQ1DxJ+

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4cd0e33813af625d99cc838e7af738703e6550aab2a1f10c9f1dc06a7b4185e.exe
    "C:\Users\Admin\AppData\Local\Temp\a4cd0e33813af625d99cc838e7af738703e6550aab2a1f10c9f1dc06a7b4185e.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\AppData\Local\Temp\a4cd0e33813af625d99cc838e7af738703e6550aab2a1f10c9f1dc06a7b4185e.exe
      "C:\Users\Admin\AppData\Local\Temp\a4cd0e33813af625d99cc838e7af738703e6550aab2a1f10c9f1dc06a7b4185e.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b205c219f57996fa0546d670ebcb40bc

    SHA1

    65d06164fa7fe34e2ea2692bca294c0f55d15628

    SHA256

    b8f623c6a94ab941b11f90466c6009abf937182646a15490b773ba5669989d10

    SHA512

    1241afc61f8ffc1d38fc245a18ffdf8dcf4c2a982c0461312dd762d52f735c350143fad41dec024ae8dabb27967688c5a7654712691658bc345357732d1e936d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    951c1acc7998157d9cc2a68dee9da140

    SHA1

    c9d10d60eca43b51e66ffc0795b4b56b2c104342

    SHA256

    92d5b900e499868c1280fa76667c0ad846e378531894542022f93bc9ab6df798

    SHA512

    9e976b54902f2897933050057d58926cfb4f33a3ce9ee72d1239786342524ddc8c155f5341a222752162b5aa2a3f6e4a4201612ae4c1f2271d5427b5d0993447

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1ea5eedf9f716e80e5b4da3dd9fc07e

    SHA1

    23955eb05a393cd5f15f199c8d1ff97221456c4c

    SHA256

    c18395bf1597efea915f8d1b732427cc36aa72b3a9af4cf4d316fe9fe1a6f96b

    SHA512

    922f18db8e06907542e65aa4347f69fac258a7a8d910d0251d702ba65aee5a48fcfde51242275ae93f479cd8bd4484a00a1bdac9149951ec7a8506b35e5fc7d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f820272d0dc2e82e00c3698a746f208

    SHA1

    05aa285dde0a204df40fd41b15b4bbb6bd079b09

    SHA256

    50c8a107239508369ad5873f002920bcafed45dc1601b304abe8b23b2e7e8b12

    SHA512

    c50a31ecf75d260f0275498822a1f0a0792f10756494772138c609bab2c12255dc74046ab0b7ccc9a204374b8b02d32424e7cdd87fc3206eaf025a151160b213

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c81e4382af2686dee620b646339acf9

    SHA1

    5c9e157c2fc2a3ae97f75850016e5dbba1f288ac

    SHA256

    d1e5c57541a44e05912f89fc2563c8fee7d91a1e67c34425c2471ff9c1669055

    SHA512

    56c72b6d3391f88fde055cd313e2f6c22261318ca6ec0a433e4a86aca2217563c0b1adbacedc7b6480f806309ca89219259cd19a77c2fe092b71dbee73adf8cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd6800b8d08f8edf8d6ad7cce6a04a70

    SHA1

    0d2a70a77f4e2d112002e8d2e7b1d4106ef7a407

    SHA256

    a0428bc2f3ed8ac0a360e0ed2582e2f5ba6aa4761cef6eccea6b411d313941f9

    SHA512

    8bc6854053619541864a3f628e927b57d79ff96f35219ab60528eb45741993914b9eb1103bc14669f3d010bd67f36c59ef2b9869f0c0f4911c3cc1649343bba0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75d56c7baaaa094e3685706ce87acfc1

    SHA1

    91ec20cc87728001b1f61315b1394c15e3cdf5f8

    SHA256

    f47240343d6cf8b625d745056bb88a04cc802e4b66c76442fb321a303ef7bf08

    SHA512

    0b1f4cd61b924248b1c1cd0846b6b8c1568f76fd15624adf24ae71bcdb2fdec1779e85d72d2bce5628bd07d2e667ed84ed257233a7c6d9621603bc1619498d8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb94cff1ed19462f6d335ea123d874ee

    SHA1

    f090bcd8178d7523fd971253ad8268ddf44aa83a

    SHA256

    46a59166f47939983494ac630be9fc36f3dccdce51395746a9efa4e14d3f3f6a

    SHA512

    49dab89b0f2c4f65e01fead95c42207deff8a3d80984edc758a555f910f2bc26a3799a745c60c1c7bcfdc65bf25a8bfca964f3bea2aa9a974dc9d376209b5384

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa7a53b59c2436e9cf9bcf19838d6efc

    SHA1

    d7ceeecb6d4ba806639c0aef9b12ac3e72b1c6b8

    SHA256

    f53336c9b7d80de26085a2e2f0e4901ad8cbd1d67978cb9386f0e61675caf0f5

    SHA512

    0fedd2075c83857808733d699f98d986ca5752aefa31e6ce31115839c9afee456419882d5ad07649e187472bad0dfc31a13ddeabd8a2254b6213ac1f65e52d1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c42dc953a908a4a47f85c857717cf88c

    SHA1

    9366a4650226e878c180b366d56c1f262e62bc2d

    SHA256

    4c48022f7c3ee836aea5d98c6cf9924a67b90d3875785489a063d770115c616a

    SHA512

    f582a61d0c242c6840beb2203f1f29d42a53355de463329a4a077e7e3a6c7dd75c4301928614ad25ee616ff315f4923451c1ce4e69506020eb3b1b9a69b9c439

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d3b306c695e3293fc7384065f15a410

    SHA1

    104c2d45af5ac5daa65ccc9c10223b93bdac6b7b

    SHA256

    64168a67952a7601de85795ca5610f3f8a072b4a28aaa8d4c80abb585e46acb5

    SHA512

    c5ab5a9d4db6b96175deb16250824034cdf8c16e2603e969354652d84f2508e48a3e58672c840c40cacdd17ab4bcd59e6c29c209174c15663131ad802037d464

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0648dfa8ebc8ee2ff996414638204487

    SHA1

    2098e56d9812675765ec16d8feca761e57bfe5ea

    SHA256

    9de2a107eeeb826506b14d743c9ec78cc95d10a00a13006d75a11ae60dba7a7b

    SHA512

    9c08bfa71db3c4cf9823073193f566b5c530e93f8ac582b3107b7a69e9c96d8fe1bcd867a5d7d30208143cc43c0bd7cdd6ae4f26d46cca1c360efc9bb80cfae2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f39002bd060044d35ade5cdb087ddc3

    SHA1

    858e77980240d707630afaa56d5e7a25c0cee098

    SHA256

    12f4d083f60971adbd69ad4a24d3f096465b6f972df4deeb4916335a69042509

    SHA512

    8067eebe8d385565518066626503813cb6dcdfc9835b6167c4b5c462b55946a305aea5b995790f38572fb93da4afdaa158df2ce9f2e1de57dbe61278134a51db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    103be5590c9d8ca728d53bc89350d0fb

    SHA1

    39baf88709cbccbabba2868dc59ef475169270ec

    SHA256

    cda7a632b09eba917eee6a459f2407a3b5dfdc42cfd55211c718ab23cd32449d

    SHA512

    f7c3a5715f111aed25e7b15ed197e3e6c6acd69bb0d483b63fda626048327510051128a1907846d142345a4b9b6939c84e46016a9914461fef9e9baf5359535c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46df03fac5ee5349fa904339b31b9c1d

    SHA1

    6d754f33111b38ee86e0a9b04f574b6afc71ddc2

    SHA256

    1b0b04f256cd8b685d047fb00130afabef38546620e4d712021faf6b8a1a7b0c

    SHA512

    ad9ad0fc881273100dbcd06fd4157ecba21b65d1f53a6e6c638d5014a4368cfda4e97421b7a3eba140c9898fa8cf481bf6875b732a30cc1b45b3dccbbb4c9048

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a08f0d73263e5fac8a870c606d81fadc

    SHA1

    7b618c18e15dcd63e8f085dcce23b6fde5560c52

    SHA256

    a05be102148bcf8d8a73c8df4b1a7a797876af909095cd10e6c926ba517817f1

    SHA512

    3ede95845418b4c0d1262916c8fa194dbcf580240fc09b64f085c7747461a60583a59e61d78276e82abdd0094d5921be81759b84b87d2b1695906d40df8a1b12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df7aaa44b88cdf41d50353da18ff9427

    SHA1

    5265c82d19c20681a809dc383ba931383695883f

    SHA256

    2ccda5479b5e50f35d2649403228372c3c0f4a9ace129f776b391d5118edcab4

    SHA512

    649b0c4919624e42421294dc7830cac63e8907b12aa366973076d371d180a7e7636d43b7ec33e0953601c4b27f8a56d6ccf4ae632f48de1b05000ceb6620eea6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82ae864213636afc45fcfbe477b08ec2

    SHA1

    827f150d90dd708f95c1750a06ef388d6c8993c5

    SHA256

    fd362ba5d70de383f006388be05d5effeb230b2d63c249aa9ca260a4dac02acc

    SHA512

    ba9bdf7fbe19fecf6046b8abfc228bbc66efb15f0307478582bd13dd7df5068941567557dac44498512cb914506d5727211b1f3be010d1fe75ff36e7ac3154a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1d561f476229bf07698f6f3a3b38813

    SHA1

    ddd8b3a4f4848a3e0b369d62c7cb5372631108d0

    SHA256

    90763b68aec1ff162af01c861e667a89781e6ddb6ec968c3a82be84381ac655e

    SHA512

    7608261ef78a8111c34c7eeffc1d31c9a997ba13da1ff563c8e22b9999bafc1b61f9f1787a4535518e0c33c9e915a310df5801d30243a271a50867c7164bba44

  • C:\Users\Admin\AppData\Local\Temp\Cab7E76.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7EF6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2400-2-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2400-1-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2400-3-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2400-4-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2796-6-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/2796-9-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2796-11-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB