Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26-11-2024 19:43

General

  • Target

    abc.exe

  • Size

    72KB

  • MD5

    37fa8c1482b10ddd35ecf5ebe8cb570e

  • SHA1

    7d1d9a99ecc4e834249f2b0774f1a96605b01e50

  • SHA256

    4d2eaca742a1d43705097414144921ae269413efa6a2d978e0dbf8a626da919c

  • SHA512

    a7b7341c4a6c332aef1ffb59d9b6c5e56ec7d6c1cb0eff106c8e03896de3b3729c724a6c64b5bf85af8272bd6cf20d000b7a5433a2871403dd95cca5d96ebd36

  • SSDEEP

    1536:IVbwdLjSUfCOjavEG0t6Se4juSbSDwgPCIMb+KR0Nc8QsJq39:okaO8T0t6SesS3PCIe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

103.42.55.251:8080

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abc.exe
    "C:\Users\Admin\AppData\Local\Temp\abc.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:5728
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /0
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:6108
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3800
    • C:\Users\Admin\AppData\Local\Temp\abc.exe
      "C:\Users\Admin\AppData\Local\Temp\abc.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      PID:4628

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5728-0-0x00000000005F0000-0x00000000005F1000-memory.dmp

      Filesize

      4KB

    • memory/6108-1-0x000001F4F6410000-0x000001F4F6411000-memory.dmp

      Filesize

      4KB

    • memory/6108-2-0x000001F4F6410000-0x000001F4F6411000-memory.dmp

      Filesize

      4KB

    • memory/6108-3-0x000001F4F6410000-0x000001F4F6411000-memory.dmp

      Filesize

      4KB

    • memory/6108-13-0x000001F4F6410000-0x000001F4F6411000-memory.dmp

      Filesize

      4KB

    • memory/6108-12-0x000001F4F6410000-0x000001F4F6411000-memory.dmp

      Filesize

      4KB

    • memory/6108-11-0x000001F4F6410000-0x000001F4F6411000-memory.dmp

      Filesize

      4KB

    • memory/6108-10-0x000001F4F6410000-0x000001F4F6411000-memory.dmp

      Filesize

      4KB

    • memory/6108-9-0x000001F4F6410000-0x000001F4F6411000-memory.dmp

      Filesize

      4KB

    • memory/6108-8-0x000001F4F6410000-0x000001F4F6411000-memory.dmp

      Filesize

      4KB

    • memory/6108-7-0x000001F4F6410000-0x000001F4F6411000-memory.dmp

      Filesize

      4KB