Analysis
-
max time kernel
87s -
max time network
87s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 14:48
Static task
static1
Behavioral task
behavioral1
Sample
Transfer-https.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Transfer-https.vbs
Resource
win10v2004-20241007-en
General
-
Target
Transfer-https.vbs
-
Size
7KB
-
MD5
e2f4a3c6e7570b4424089b24b059c9d0
-
SHA1
19c12a30f1cde384d948d32d1efa6f8a541e2a60
-
SHA256
44fd76bed4f91723940931c035a1e92f7d26d7c94dabd15f2e4a8db4f6e48273
-
SHA512
646e2cd0517745c4b36a3178edd8f48fe46eb29a2053d83f6beb61d9e5205cc97d1a7f9a65ea0190044b87b1275d998779025d7ede2253b455782d5e40e8c0f8
-
SSDEEP
96:ZGze5ePQfJEgaGscxriEto+TE9sfQcHOB7uczr05LaGejhVPPCyCsB3fD+r2:UzezgfEtoRGocHOBDzr05KbPKyNBG2
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_http
http://89.197.154.116:7810/GHCSKLHA62xAo0GiJ65tlwmFvMO6tQNKeTswMuKxpybsim_N2RnNTId_j8dnBmA9vnYOyNR6EU7eXYS6AY-Rox46MWUiLVByUmCfxHjNCsvWTIsFuGs9e3XKhc2dJ6Jls10lHzhDwU0eh84XVkCbmUwBJfgF33CNXlpD8tpFnQKUyLbbyQTF_Cn32t6uqwBi89JgBGKEY_FfUBSCI4FljPsd9uXGcHm2BThT
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 1 IoCs
Processes:
hTSebfAkRTedaXH.exepid process 3028 hTSebfAkRTedaXH.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
hTSebfAkRTedaXH.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hTSebfAkRTedaXH.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
WScript.exedescription pid process target process PID 2496 wrote to memory of 3028 2496 WScript.exe hTSebfAkRTedaXH.exe PID 2496 wrote to memory of 3028 2496 WScript.exe hTSebfAkRTedaXH.exe PID 2496 wrote to memory of 3028 2496 WScript.exe hTSebfAkRTedaXH.exe PID 2496 wrote to memory of 3028 2496 WScript.exe hTSebfAkRTedaXH.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Transfer-https.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\radA6751.tmp\hTSebfAkRTedaXH.exe"C:\Users\Admin\AppData\Local\Temp\radA6751.tmp\hTSebfAkRTedaXH.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5862eb49999210f509381d9a87db9dcc6
SHA116d1a6c105179b483bdac3445b045916621aafb9
SHA256bb68d7a2978199a199689ac40cb70926c7fbb90ed55364fa8c562964732193ca
SHA51293955f21cdbb8f28b24838597cfa0e264dc5e2bdcdd24165d9a158cbf46f857745ab0ea33f59942b56968ab4e876397eb4f537b1bea5f571cb48fd4b1924c0aa