Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 01:44

General

  • Target

    433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe

  • Size

    723KB

  • MD5

    bae1382ebc9b5bfa167c1f27a2de9a50

  • SHA1

    fffba10e15287bab45038f2698c260bef7574674

  • SHA256

    433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1

  • SHA512

    61eeb9459add2df90bb50ba91497bdf750abcab569b8502852d4b3211d187f15b9fc8aa18b1f40e44ec5bc62ab2ebb2ffd46febe8642a7e7ad7dbcbb20ac6cba

  • SSDEEP

    12288:9Vt+vOLEZ1kxCNYyJElzxRs0uZz5LVI7Tua9dVo4t4qM20Gq7ADHfaZZkz:9+v7kKqXTua9dVjt0CHeQ

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

10.17.65.78:1024

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe
    "C:\Users\Admin\AppData\Local\Temp\433118df41a9d107fe7e07128186fcfb7b934ffcb7a1aadb3cc02fb6900cb4d1N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Delete /TN "EVKey - Vietnamese Keyboard" /F
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\setting.ini

    Filesize

    652B

    MD5

    923d1830f97cc9c5367cfdea115d2b0d

    SHA1

    a13584dab18d0b1d56ca241395d6b93071f6c785

    SHA256

    7dcf9508ce65c31607f1ad282bdfeb640ee4b4519ab2014c1ad31e8b787f843a

    SHA512

    73d326ae30c801e2f12a2ca61e079d675613289cc815a82ff4bbc958a6193b08791e941738208f0013a1835580c0446d1795999078959f5888338cebb8fb03f2

  • memory/3040-1-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/3040-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB