Analysis

  • max time kernel
    119s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 20:36

General

  • Target

    104d56a1fbf8bfe0a1f9192084ad5c79741cbe977576c3a6ef050eb6ddf5a472.exe

  • Size

    1.8MB

  • MD5

    c4ecb069115fb3097aaff4a91dabc8e4

  • SHA1

    bb10418a36aa237f6010e10e010e4f7e4d292cf3

  • SHA256

    104d56a1fbf8bfe0a1f9192084ad5c79741cbe977576c3a6ef050eb6ddf5a472

  • SHA512

    958c6d375597597f2cbfd8e5f3f89286fe90641c5f5146c1b49f6c02f716f11a04669a4941da676b87bd628d5e251bd9e483c977c358c46a7a90fac429d6a1ac

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09QOGi9JbBodjwC/hR:/3d5ZQ1AxJ+

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\104d56a1fbf8bfe0a1f9192084ad5c79741cbe977576c3a6ef050eb6ddf5a472.exe
    "C:\Users\Admin\AppData\Local\Temp\104d56a1fbf8bfe0a1f9192084ad5c79741cbe977576c3a6ef050eb6ddf5a472.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Users\Admin\AppData\Local\Temp\104d56a1fbf8bfe0a1f9192084ad5c79741cbe977576c3a6ef050eb6ddf5a472.exe
      "C:\Users\Admin\AppData\Local\Temp\104d56a1fbf8bfe0a1f9192084ad5c79741cbe977576c3a6ef050eb6ddf5a472.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf98a3dada7bf0ccb71fae59c10bb030

    SHA1

    486bf7c54aa264fe8a77966378a43d0cee2ee2f3

    SHA256

    5801a10f06c780eb0e37106703243ec30f927c02f490679a4fac301ed577cffa

    SHA512

    92baab0386d18a0865eb6f5d55f1eaf3a4a885febb2a515c2ea718b7852474b2d7820201c8077088e471a1a3176b1cfdc6c399e65d20483a83436f1cb5f3f122

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b0b91c32bccde8ff4769ee19db6bd8e

    SHA1

    8478aa42448b2f10589caf37be4400a03b180a37

    SHA256

    d6d531923f7edf62e09899aa77c0fe8f4224b4fc28265fb82753cc3315dcc2f5

    SHA512

    7999fe74f5275f6eb7d4bc2d406a5de944bd975351ec651342f8fc6110ede2ad94995fb99308ec5e13364a5f60bdf7ced6b30eb67260c2130f17125317db1769

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7577671274d55618ab9521a5880b5224

    SHA1

    b2c73bcff9d00250219810b154c09f210e502983

    SHA256

    aa1e7c1dc1370475c3ea5b3e32410789a21d88f7dd2a32b3af816448f8761c25

    SHA512

    062d8ab422b1fd0e981be4b337d4a09eb6ef9ce4a411d72a78f5c388a47cf5e6c881887e91814eca417d019f80b974a90972a33df54093f1ac6ad1664761ff06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d286c6a4bda808bcf1b2a23432e50662

    SHA1

    1e4e237a7b4c279d14d1d8a30766e70e0bfad82a

    SHA256

    c6cd52fff190d58c3066880abb7b3e23bad5c47c6a2034d5fcb003ac421e37e4

    SHA512

    6b55ea69779bd9d03fe316c1ce39a52323d7a1c409392c911776e1f07885823d25595273610c3ba7e6207bb3682097fd1947cd2ecef26017ae419d9b648a5285

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cae3db43ebc3d4214629e87778b2f45c

    SHA1

    1a8f2c4bc7d4fdaa4442e0fbe9315c3a5789f13c

    SHA256

    396edded425d8dfc54ec99e26af4c7c6d45d35640875f6a5e7f2b70cfec86422

    SHA512

    62d7f69b0ee7950e775b198c031bc3868ae72046b7c35e35142396104ff0431a3dbdd07cc409d6c5be0768b570c98608c790be6d7c604683cef7eecf4cda471f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b21f8d03613ae123a89641668e00da29

    SHA1

    44edf7b2f6e74fa22efe6124247cc2e33fc9f577

    SHA256

    c8c513f4aac8e2c3644fc007f54e7077f3b030046f74217532ba135797ad916d

    SHA512

    648589cb4ab0a537191ceac9ee919742aa77ce268ab50b9ed6d148c423e8ab9fcd82496c4966caa5e6a1ad5654449fb59a9dba0696d02d93f344cefc0a385beb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    52f6aa0027531cab715c5ca44595b959

    SHA1

    046998b8fe8bd4b03dacca1e7819821a5f203c9b

    SHA256

    a16dee6b04218f5dd9f19cbc01c5b0ec18ce016cd4b7e398507ed9d08f921b5c

    SHA512

    4180c08a033601cca738e4a5135a076e83e16ded4b629abba0b63d0bade54037aab3d3846dad84d7df8f46fc59c97c2db7fa08ba03ccf6e9e305b4b2f59ae058

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08c6c73514758aed7411c09102c31783

    SHA1

    120f0ac3f33075a4824915f1afb1e1d3aa816a49

    SHA256

    d25f8ebfd6e04e8c296b55e33c4e795de77ef92ae3e87305c5bf523ce0bca113

    SHA512

    c7460831fe647fe5b2250d655ca4139f2db10079d046c764c819824ca618dcac35b1831a7f0536a537ed53adaf39652e7e8c8cc13565f6d9ba4284955b86fa6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d22039c26b9699f9ac51fd8485212fc7

    SHA1

    3c70f337f67669ad1e27621ed116c448f496b316

    SHA256

    6211f81e10c3a5a695e2de3d1030517dfd403aa5dd18167c58a99f459fb41c67

    SHA512

    26d620b225f6bda976d1514e8774c8f20d877c86b3b0ae3a890b603aa6ed59fb5bfcfab9161109bf82cb4733e2dc14c6eea7ddb5345832f6020286ea40873f2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    258c27c897c66b914d129f1f74062487

    SHA1

    361f98ecfdf1f2dfbf4a51442ffa20b8eb4463b8

    SHA256

    6d24ac48ab4fc5f74201edc500c80c4cf381c928824a9d1c63f439c422924896

    SHA512

    1f7aaca3fa8a72daaf348a52ca8e95bcedefb4a904e07850a3fb097aece038ea5b8f22c98a2555423704f463728009006bd66a0703bbade945785c026889eae0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32a08f9d7f93d77c7a1394947a5ca4cc

    SHA1

    0163b87b886394870b89dd80d0af330b40a41bf8

    SHA256

    aca0b79ed6a9fe95c0ac0c0e0b1eb5381f7153cbcc1b976500c3913c5698ea8a

    SHA512

    739499ca8abd606665d143dc09597725424b2dc42ce330ae8fed7154af4c85016c84ef4610a0e3c149d5277bf01938c9b8ddcec229a5d062019bee16e93abf04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35abf5372a406436d081fe91148ba7bd

    SHA1

    32b3bae51ed0eac6e9547b67a3e1392cfc7631a6

    SHA256

    bb260cf43503a1add3f61142d797cc76f9c50d3cf5c2ad216f228e9df30c94fc

    SHA512

    63cbc5de304baca71bdd8122fd92726f987bcbeab193278fcf93ee57038052c8a22310742eae90e859cfd56e9f0c29e3e4af1c28e4951c62960d1cf0f2a8050f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf064e26b574b8684e8e344ee1682837

    SHA1

    c5bec04a61db5af96fa927fc9394431832fcaa38

    SHA256

    832dda2c97df0e354d26a7f14177f42e55f01fefa3e835a311d75347aa0b3662

    SHA512

    c205e1493040c9ea01d2e9b899b5561b8ad595709f19a5ac8c988532daa0b2043a993221854ba45312ef9401cd3dfee7dadb2f5f68adb775e21772d689e4d98b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a5097b2b44fdec59951c9df04c6bd9d

    SHA1

    e848aeae82e7bbb001e0830a47f8a2cdab910710

    SHA256

    fc6e9d0caa78500068afd17ede1413d74a85787c8562223c18b603e4fcdd147b

    SHA512

    1a6ced41ddf1ef6e06f784eb2818258650d411f0f8c001bf914f91dbe73e99a3196b9751f094bfb2fbd6166f9f00997c166494daed7c531766c54d70da47a28a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e86576bb9484f73dda11b74b5c7d7ddb

    SHA1

    4e10feb958288f5cf338b78f248c2854e8158a11

    SHA256

    7cf84a45ce94e0d247912ef12533a0f5a547060fe9f4be737480e2e072a24763

    SHA512

    9e6cb9e3938d8dd56af3455e27a56ab496fa0e515cca5f206f9a9be7742330cd67f6c051bb40ceb60673979eec41fde734055b07053dd08066b7d421408f1e77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    788c5fffcb65054cb5cb0535f107d348

    SHA1

    82fe2556487caaa49c201ccfbb2c60f12ee80b78

    SHA256

    976d6e8bec2c7a23d3afe12efaad93eacc27f2dd00fba1fd74ebe70fd5e8f3e4

    SHA512

    47f5ef3331aa18e280be0c5e177df25958045b7a0d38dd6ce809faf32d3bbc0368b250d104a1655b0c1264056d60ff4de5f72b46c36f11c5489b97736610d7b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0f0516785f39706131087627810c4f4

    SHA1

    8871d0465424e30d5adbbac4b0562e13601b944c

    SHA256

    21c4b3757948232075b59631e9fb434fdd5b815ac22422836d0e3a86cc5669e6

    SHA512

    17c0e103ec8c7d6e7596c6154025cf54fb2f8550cd614f61ac6cc6878ced7fb0e854fedc112ab7a9a7ea6413ad770bee6c911d3500a307652a785c419c7a1c2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c746a18cf194961c6a7a675dbd80b21

    SHA1

    55ac2018063bba8065cc653800e61327f4d537a3

    SHA256

    06ad01b214956fdfd6a8871131177365334fb60fce8bc3bf3ab8c9e756b9c770

    SHA512

    cfa05860c3ba8a91eb446ed814477a0ffb948eb180110755cfd3edd8829137aa4eaaa4d66d66575f64331e955820b2d3127b58c7a16445770845bea09dfb0569

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0b30147f82f99d673ec20cb958c4660

    SHA1

    ccf5fc6dcffbd415214b4b70a7937d63807201ae

    SHA256

    8760759a3bd7a774065c531bc1f465caae96200479ae0d8e533f9c43af632284

    SHA512

    e10c9ba72bb3b4ec7402674ea717e7407abbe7d86b63472cafbdb82e2b08b68d62c54840f8aca60968104f72732a56c65466dedcd90cc4682e295d4dee0981ce

  • C:\Users\Admin\AppData\Local\Temp\CabC67B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC6ED.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1928-3-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1928-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1928-2-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1928-4-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2292-6-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2292-9-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2292-10-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2292-12-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB