Analysis

  • max time kernel
    122s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 06:14

General

  • Target

    599860291f233356b83ee08b95aef4b3c9117c93d01c23325838086539b16e64.exe

  • Size

    1.8MB

  • MD5

    65766d99ad0199b3c81e9e0211c581bb

  • SHA1

    b23959987b3f71fc566d650ac9561935ba88749f

  • SHA256

    599860291f233356b83ee08b95aef4b3c9117c93d01c23325838086539b16e64

  • SHA512

    91d3734aae22af6e63523dc7f6df785100239d68e78999919c9cb642c88e024388448fa59eb21dea561faafef3e3ba010ba46490ca8274a135c4a3945f9b89cf

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09KOGi9J3YiWdCMJ5QxmjwC/hR:/3d5ZQ12xJIiW0MbQxA

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\599860291f233356b83ee08b95aef4b3c9117c93d01c23325838086539b16e64.exe
    "C:\Users\Admin\AppData\Local\Temp\599860291f233356b83ee08b95aef4b3c9117c93d01c23325838086539b16e64.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:876
    • C:\Users\Admin\AppData\Local\Temp\599860291f233356b83ee08b95aef4b3c9117c93d01c23325838086539b16e64.exe
      "C:\Users\Admin\AppData\Local\Temp\599860291f233356b83ee08b95aef4b3c9117c93d01c23325838086539b16e64.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9de278d4576a46e2fc76ec48461b3743

    SHA1

    a66516ad9e59bd6b95f16732c4c5f784af935964

    SHA256

    ce795eb73cfa946a24db8a005a817f15b9572df2dac00008344727f81840194e

    SHA512

    54da13e4b7d09c6905f6edebd42e7a24647d5668157a3ff716331a5e5b271b132543267faef988030be3b7a9c323469809b46f6c93ecf473804d7b9472bf6dc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5da78b5453d035350a60a4269f9e5cdd

    SHA1

    4ea2c022868eb215b524cec7af4ad279b62fe002

    SHA256

    876dc28759ac44e0d5d4b23da44daec2b07d5d149431eb178b8d680f017bab8b

    SHA512

    f0356a4d80e0e419ee9925dabf8c1f28c1d1d8de1e4f1b755b88003237e7f0576955baab1842fa9d9e47b7b152a1aeb7288d8a2b642686760905510090905218

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92f50a9803dc3b904f7ca2e470571ea8

    SHA1

    a4389834bee094e34338e0ad4a82ed3c0870e720

    SHA256

    a10e56ccc352843e0007adad474744cc2634abc523185f4f4d955b5966928934

    SHA512

    d1030b08cc1ea206be2332f80fb4c7b03da32d1f1b2ec81ddd81a88f1caab98d45191291cf2abb7349810845bb92c72858bbebcdbf3ac79e678dfdc25204a1e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0301f0791904ca60986cd2da6c4428a8

    SHA1

    d81d5c3f65dfd0d117845f2270c2a5848ac9105b

    SHA256

    a276bc6d8bae7ccce50149ea3e79ee7dae7d616ddd4db5451f014b39a5e0fa98

    SHA512

    6ba3243acdc5dc2649738040d76cd544931c8cdac958fb1fd103a2f10872eca0fab4f600c18a33d4a17a91a1d5eebb28f3e11f1a003a0899b27184daa49792ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3647bedc8c2260f2cf16819a141005a

    SHA1

    1cad43526740d7d8688cf1bb56abd8e9cd67292e

    SHA256

    c8ea4fe5a1354cb8022e6227b6601be9eb8d31700bbb20db0fa737305b3b3a0c

    SHA512

    a0fafb3bdd7638ea8de109d25c52418988a0bdc089fb9c9b6d2727aa9c8470cf2a6889dc9e5ef3d43d170f4c72cf4dec9957e601b25415a131234033d38c707d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd70c5437de97e1bb7a555e5603d879a

    SHA1

    000fe77bbe0582dcdc1039f9d12d0b513060fcf4

    SHA256

    ba22af00d5ce49cb9f869ef4a8c3e64da74ab6fc7f94c05e9bd1f5f5fcafa8d7

    SHA512

    6e04fe418df56c06de8e7a6511bcb6a7ac72eeff3521e2ceb4d810e8cb1334d5eb6b67052eb07e8f8b977b6e309e7c1508fdcbb0833fc3237ba757d984a8521e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4e7177974d91c427e810098863d28aa

    SHA1

    d3ff355d004a020a7a2c6732afbd3dc8b664940c

    SHA256

    016aa93000d80fd5f52641718237cbe8af86c602cb506cbe5c7593ad98d1cf38

    SHA512

    630574848452486509ca50c9de5d457c488d6356638027f7cd48dec41ba52a05b04e7b871637ec1987006a770bea45cfcfea15475c0be65fb1248566bf8670d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa9d7f4a05eb1426235eaf0d04d77ec4

    SHA1

    545b3e23c145ed611a673096021b656e1385c405

    SHA256

    390308e53758bb8249a2a1457f9ef8d0774d42e2b6e533450ef091ef24ebef7e

    SHA512

    701ce4c581cb09f41a40d0ef41a8d8c230ea02bf94f1aa08d91750c11d891c04a881625e43d0a173cee7185e09919eff2951856f1a8f629b71aeebf09efb15ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f414e9edda8d7118a9ae31dbabe3c01d

    SHA1

    5f91027dced9369d0947626a70eda8d39dab6e10

    SHA256

    7f70d314be03985bfc7f24f16cfc785ed4d4df1707f91d258bb4d6ed3a5a034d

    SHA512

    9c639a9eeb1fce8472b399c7ac80ef206e187f4fccc5986373b6c08f10b506732e35d8c95b9afe219e2cf2d57b755a3cb14803271fa615b5c03a3898d748eb60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ae3d7d38c0bd9dc74149c031c88a895

    SHA1

    e2490a6e11a3587ba6e7c22f59e867aa23d03dcd

    SHA256

    6573a4e76efd4424ea00fb015ef0abef71ce2e9d574d7ab943e5fe3f7da488b4

    SHA512

    d85d662fdbcd2317d46d72bbcb44e554894e793def2fffdde03f4cf4ffcabbe6a4731e1027c4f45c6d23b3f0a6abdf61a467142e85d4e82bfc4e6e7456d35f73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e000ea6563d28a14250361dbf4285a6

    SHA1

    46fe1a6c374ba1cb751872d87e74c0e1e4f0db41

    SHA256

    facd1be2fdbaa1db76406d8b936ebf6221fef2f3b8a0db95a6d920f89e854be5

    SHA512

    e36649b1988ba41d6e9b3faa7145a2dcf950c22d881e159a3c4632a8c74a91ff65d0e53305b23f068bbe4d63f341a24037cceeff90978918b371bc2626105f35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85a943ed455290c841317edee6d6fd90

    SHA1

    ede140354f0e94e0355aef15fbe42de6a59e3752

    SHA256

    7141e5bc5bbcdcf01248866afff888f204e29a3de4575c7f0b9ad312ac7b80eb

    SHA512

    d840de2d5b6880aaf8c6d6b91de3d65512639727b268778fd096a25973f5bdc9106fd9b85311a52d0028fd09a38cf2bff7425da122d07e414b43a9128f6ae26d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    859d46aa39ff8ddcc6fce00e559fd12a

    SHA1

    3748d394193d1ec81c1d62ce7be5242c1bab0b0c

    SHA256

    647792b87537e47ffab418defce28d9ad8fc1defd23f10049c52a0ce91117049

    SHA512

    f9a90eb37e9f5e4a3f9f56fd24fba4b0c5ab1055ade60bc52f2faaccd1af70897e58397392ffb409fb2861448fff7de862d07f164d745a9514f284811aa75638

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1e3b6568887ab9205d616a4e539caa5

    SHA1

    908655c9233bacbc028fec15b1cf9c7c71ebee0e

    SHA256

    c5afc60811c09f7b76a0b40049310081f1b19d2e9a56183a3899ea8cbad9d70a

    SHA512

    7047fd658c529e87e2515d9f58faf8607c22957b2755430f239617672a39facdd21cb38970e29612d0e58f9bd75c5f93c6fb16e24a15b5618f15b3662beb5299

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8a7cc63a2a9b2a93631577f74a19a28

    SHA1

    0b34837de24319a958fb362231fc90518661e278

    SHA256

    998f753c53b2a02690e3fb615ebc051d94e26b97aa01751cde77dbbcdc0a5ff2

    SHA512

    225aefdce028045e11195271c68b7efec1c9f32bff26a43042f2ead625d2df3f436b6c9716865cc2677caeac759a103c9ab6119a47173f4a01e34f7a8ed00e56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc86d085df3cc072d3240d91e4d5c8d8

    SHA1

    652fd6f186593f07131cd6abe4eafe9b0910bbf3

    SHA256

    baacafcaac3db82f2fe82af47c8102640f18ab921c589c9e446a464df0ee92cf

    SHA512

    3dadb85416c8a8e5712944a6f9b915ad12471f5440842c2cdc08733f1d46ae231a02444239281d5803137c8d49945f67a06c103c0f5905d7c0ef4b36922e3b79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe1ddb3921e2b0ce0e64596b1625bd55

    SHA1

    c4ff8843b6101140ef89bf061b53aab3922b135e

    SHA256

    f6e5570fdb20aa40510dc97e94494c8fe9e199fe6e2b667341679ef1d3d6b442

    SHA512

    0dcf850326fbd0c5714924131d7765e109c0afaa891bd92734e519b4e550e3516145310d701723a9a7e002dfe9c80e76e6deba28725aa4f6d25c1a68893de43d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cbfdb9e3be8e5ea9590fe1df63726265

    SHA1

    db3da3d152d328a6ced7d7ab1c34d5670fde4aff

    SHA256

    673f55efe4be5a908ec251619374cfe9f39e5b0de93a61e9ddd7df6ea4947823

    SHA512

    6fd43f9ab420bd72021c320c319ef74dc9336f152e81ff105dd900e6559e449e21fd2ec5238af0518bd541dd579577ab738575498d6a870dd8214178a19a3d36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f2aee358ad82a61f30d715548adb357b

    SHA1

    df294c870c1b5df53ada517dde13323bc626f37a

    SHA256

    cc78cd7e27fc93942947642012d050f5020de44832b18462b662b82c15276691

    SHA512

    a21defce3670db9891f73a3ec5f82aab08455919572edc08dd074db07daece8f7a9aaf8f9394c0975b70267a9026358eb4f5d0bdf63aba1c942db0da30911ffe

  • C:\Users\Admin\AppData\Local\Temp\CabC3A0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC46E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/876-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/876-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/876-2-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/876-4-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2492-6-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2492-9-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2492-11-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB