Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 07:44

General

  • Target

    msf100k.ps1

  • Size

    251KB

  • MD5

    815bc9a2bda28cce0c598780c6a8b760

  • SHA1

    b69dfbc0bde78569fbb6f80375d37747d75735d9

  • SHA256

    b8d143e811b80961bc4245ce58cc04c81950246b11ff294917d269a239b7b160

  • SHA512

    5d7c308ab8bb6414c485edca1841ca0eb00fea78f569a7c621fefab9aa2b8ff5cbc2088fbd1a368804c550a7f427356486d29fda316b6c34b5980bff150dd485

  • SSDEEP

    48:q+MThimb7RBARAbLPorNfAse3+soGoNeVBXTSbS4:BGTXA0PohfXBGoCJ+z

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.254.66.59:8888

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\msf100k.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uxg7_3hj.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCB8A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCB89.tmp"
        3⤵
          PID:2708
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
        dw20.exe -x -s 888
        2⤵
          PID:2824

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RESCB8A.tmp

        Filesize

        1KB

        MD5

        81c7d9bd969d94500c45cb144a1bd399

        SHA1

        689ae7906c66e78838a4c0da6073eac3c51dcbf5

        SHA256

        1260249eb4226569d10c43cdbe4c16e23b22dcd73fe992776b43f38ed7c1c7ea

        SHA512

        f15eeb711265967e4e2497e220648c8eda3b5b3f52ee1672ffa19c179254380dfe8488d2314873aba4a882ed3a7f289e399f125b6620c7d6ba6f1515907748e7

      • C:\Users\Admin\AppData\Local\Temp\uxg7_3hj.dll

        Filesize

        3KB

        MD5

        7cf2defd1d0f4ccd0518552439aea61f

        SHA1

        5716317bda54e1c7c24a464d7e1f68f8ad97481b

        SHA256

        34f89c5000eb32589ad51411e93b4bd88374cbc8d3b1ea2963d0cce8b67da853

        SHA512

        7895a10ddd90703ecc80b292d13ba93eb9984b75ea34d6736aa809f769464a4c334b233c28ff941973fea5d3e368df11b5e496a1e3344b3fd5c5b8d13dc23a71

      • C:\Users\Admin\AppData\Local\Temp\uxg7_3hj.pdb

        Filesize

        7KB

        MD5

        55695968444a727a69349f373f08040c

        SHA1

        7322529c18713ee75c15515e8970c98aab7dbe17

        SHA256

        d2cf4647952b56e2f350a0f99d82a4cbec8fa9d90a1ce6327ab9d624f5181ede

        SHA512

        0db8cf8d551b688c7bfaaecad3aba737f185290d1908bee93d532974f216a71742774687a24ab0311eafa335b165c1d9a327c24af1b583524cd0f2cc5fe8ce8b

      • \??\c:\Users\Admin\AppData\Local\Temp\CSCCB89.tmp

        Filesize

        652B

        MD5

        8313a23ac9b396f54e0d4090a033d24d

        SHA1

        75780a1a54dd8f86b88445645ca3e993cff4b1c0

        SHA256

        0040524233a571a7d596612fc2f5ac3d9fc271cc235566006ed3302f432dae32

        SHA512

        47eec0c8698d7f173f3e0484a3e2bce7df266adf4d52570b34e380d7d2c76c8834216e1ddfc261f0710edcb87cfca388cf14e4cf3fff817f10cdfce5338a4c55

      • \??\c:\Users\Admin\AppData\Local\Temp\uxg7_3hj.0.cs

        Filesize

        468B

        MD5

        52cc39367c8ed123b15e831e52cbd25f

        SHA1

        497593af41731aedd939d2234d8d117c57a6d726

        SHA256

        5a67bcd5871f71a78abf1da47c3529617f34b47a5ab7bde0f1133a33fa751012

        SHA512

        ce6b89a38b94543b6461b5ecc01054c518a6e0daa4962e249a694db198b15602e716098868322eb8275a09d936b4ef3c0242089800bac0ab1926c8bb38d78fcc

      • \??\c:\Users\Admin\AppData\Local\Temp\uxg7_3hj.cmdline

        Filesize

        309B

        MD5

        c791db16fd6e0042ec885d4cde19f459

        SHA1

        fd134d862168470d973d2dd1ddbacd0876e7978f

        SHA256

        2bbdb7504ecbc6bd01296e5b8194d885eea7a40ddb29827b2d9cdd714321ca00

        SHA512

        19f89c61e6e5dece71f9444a89818648496f6f9c14d431b20c42688f0e2d7c7ca675035d084f119defc41c55311277b9a08a037ea148dfe4099e7d8a99c95b5d

      • memory/2404-19-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2404-25-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2444-6-0x00000000027E0000-0x00000000027E8000-memory.dmp

        Filesize

        32KB

      • memory/2444-9-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2444-4-0x000007FEF5EAE000-0x000007FEF5EAF000-memory.dmp

        Filesize

        4KB

      • memory/2444-10-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2444-8-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2444-7-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2444-27-0x0000000002A60000-0x0000000002A68000-memory.dmp

        Filesize

        32KB

      • memory/2444-5-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

        Filesize

        2.9MB

      • memory/2444-11-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB

      • memory/2444-30-0x0000000002B00000-0x0000000002B01000-memory.dmp

        Filesize

        4KB

      • memory/2444-32-0x000007FEF5BF0000-0x000007FEF658D000-memory.dmp

        Filesize

        9.6MB