Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 15:14

General

  • Target

    d180fb9deeb0fadf992e7ac57fb5cb204e3f527bcca1f04e6507b01f8dc45a0b.exe

  • Size

    1.8MB

  • MD5

    8bf2ca375bbec8986b7f5e08839bf130

  • SHA1

    c9c62acc22354b939da39a23f70cefe2be63f9fa

  • SHA256

    d180fb9deeb0fadf992e7ac57fb5cb204e3f527bcca1f04e6507b01f8dc45a0b

  • SHA512

    594b237711eac3953b4f836fa8c1b5cb2e51326860984c8839131827a1e6d1b5cb255dd1cf0b94d3166b07b2a4a30c4f4355203ee17ff41510adc2b528c50e20

  • SSDEEP

    24576:/3vLRdVhZBK8NogWYO09+OGi9J8CrxzzEB+2iLhUi26e6N5NjQO7EPWdLjwC/hR:/3d5ZQ1OxJgBILj26RMO7aWd3

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

1.15.12.73:4567

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d180fb9deeb0fadf992e7ac57fb5cb204e3f527bcca1f04e6507b01f8dc45a0b.exe
    "C:\Users\Admin\AppData\Local\Temp\d180fb9deeb0fadf992e7ac57fb5cb204e3f527bcca1f04e6507b01f8dc45a0b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Users\Admin\AppData\Local\Temp\d180fb9deeb0fadf992e7ac57fb5cb204e3f527bcca1f04e6507b01f8dc45a0b.exe
      "C:\Users\Admin\AppData\Local\Temp\d180fb9deeb0fadf992e7ac57fb5cb204e3f527bcca1f04e6507b01f8dc45a0b.exe" Admin
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1856
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1856 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    00e32b29b11426ae6a3fe64f350d489c

    SHA1

    bd949399fe70d5bfc92d53d7771ab721b5c53c6b

    SHA256

    db15060ea9b965bedaec23e49eca1c6a5122ad4fbc97fda450d7a45f91054430

    SHA512

    49bf930984d897cb01062cb5742602b6ab489d0d1fe897ee0ac087d60f6588634c7fd3c5ad28a7944894f779e77e129bfc8b489624fefa872dc6f6aae63cee02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fae50f0e286d7bc939ed1c8df168bc55

    SHA1

    45be653fe73eef361f116a73c5b9c8898a85bbe0

    SHA256

    a7bb4e6f0689db2ece194e7b11a98f6da9426f5cecb166bc8caa89a1f10af245

    SHA512

    7c1cf651aecd1002c8e05c48bb7d440d1c481c09ca729a06d78a3e8612371cff33d8049a3dcbb5f53b6c7639d95c407ad7810863d3530fd18848c876f4497c73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e72e954f98493d22223bbe0169fc4bc8

    SHA1

    84ef35295ca883ba4ade0a9f0eacdac00919db12

    SHA256

    5de81dd559ade476e5f271d6dba7fec4b04279dcada6e4d8f0a612ccbf5cdf82

    SHA512

    4f7516deb406adabed0e0d69b2902c41ef6021ce01e0801162879be75b78af3cc290941fba48eca7c67cffc8e3650a8720483a77616aa1f67358225be3ef92f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c3d6341984cbc1e5a5c501d8006dcc3e

    SHA1

    b8e0d1053198fe6fa0325ec8a0819a4afdcf8bf1

    SHA256

    50f6a4fa498c7b710d1f6c0c1e8d195deafc7df234c96b1307fb2c2ad1413060

    SHA512

    6b30d3e80c9d9d53a4eaad854752564077c9b1ff62a07537b684746904c7d286b6b59dc152981ea8fbc087e1d8e121b97a09e41dd5378891626240d95b151a1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bb596bf38e0e72fc8988bfa945ca4ac8

    SHA1

    3f1978405ca0418762d074f644b9a4a82c83c01e

    SHA256

    a057734ae788f7aa011e59fb2e61c44bb8676967ee242685b23e33c312b79fa9

    SHA512

    c97e2b015686eb64432bf50e4e99f7d977e2e2261e7af5f057a65c4b72424e6be59ad9d921178c6a8855a5d50eb5019d6bd3467e5fef0516e1adb1ae1faf319e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a7aa79750e96384566a3d226a3821e6d

    SHA1

    b0f5a3b44296df0ff0cb2b1883fa6edc1e7d7254

    SHA256

    3b2bde66892ef446bbd182e9fcfdd128e1e46373ba7505b14921b7b7c4cc86e3

    SHA512

    e17e4b0c5d9e452bce555674e63a3ae60eb8904352eaba90f1190a37fcce73dfba16d970df39c08d38d004b7db973f54e2505e4c4ab5e0908a68b211dd1be9f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3e66a917975bd70e8750874c53d03503

    SHA1

    3f8131a80bc7d5b0d9bbdf3cdc9d6dab3f4e1a7e

    SHA256

    45c3359902e7aaa50effc378bb9fb7ae8f76744908dd2986d97bce161e996585

    SHA512

    79b6ac04ca32e0f0ff5b30f827600771d9a7699833ccb3231871092c9819055f0085e8f51199ceed9a8bbf830309d1e978ab760b4cd15293f25d9e6f52484e94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2179ec14facbb762e84f9a9d26eae06d

    SHA1

    47afa9caeedb31fa87882cfbcdf81f5f5882a8cf

    SHA256

    1658a861e543f0e7c223d3c742ee8aa9816f10e96f6b23c5a0a2cfd6f4c77634

    SHA512

    3e04d2980b8bcd3fc0635980337195dfb789ca6a9d21e51e272db029bd1c3a8850713a520b342d90a1fc337bb1954738e5392162d2c3152d3198d3b7f036b2f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fce6d72ad619586023ae91f3baa1aabd

    SHA1

    402f4bd9275fb61e871dabb87b6ee707c09e42c1

    SHA256

    cef6848b85d44881635e3d4f94da368befed2078cd7ac63c84c5b9cebc6f4c8c

    SHA512

    91affd4ca65c3dd7b2f57cf3b07baec3568169a5672d6e3ec2823ef6419d3ad71f869e2d95bafce6f8933e3c13f8493961a4b5ea791c9d811fb0b4fec89ba026

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4dec05deebceddc9410172bb947adb77

    SHA1

    62e4c30b9fbccfacb12c192a7d54a8c64fd0bde1

    SHA256

    d59026a26f98837198e878d5b2ef0c8b1338fe5ec1afb03c816a55335a8c4414

    SHA512

    cf4cb5d6b6223fec1a8f691dc880490898b039afcfd6d6a426be09d8a2ba66a872beb12a3ce0b63aa8357cb33dc5ec4e69028c3dd2c682cc988e0b7dafdf9176

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5ccce62db3197119089916d926217983

    SHA1

    f1fd65f2cbce67958769ab984e909ee20d8fac73

    SHA256

    e1006cd50ee4fbd35d45ba2c72b65f9403708c672bb19ee6c513904ca8564a7a

    SHA512

    f9364e4012e7aee93560057db71e8669d850a63f84cf080c258aae23edd015c1d7a536729f8486d4bc1a165ee2b3a4264db2b7b4ddee76c244b74d9b7596d0b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db3dbb35c3e9a835b49ef4921ebb0a47

    SHA1

    a5c99b31fbd433a55f042218a69fb82cec950d92

    SHA256

    c42f5f5a28bf12e7055573397b1eb4834589b90e257fb4f4b8915a79c247c3b2

    SHA512

    db3ebdb715cef60dfe8e7815bf4140cc1d91a94511b89914e7a0b51e6beaa44260cc1fa55077c43886a24d33eda67f12d04659d15270dab1dd2f053b500f6f90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5b70417e71ae08d3e2c20805c2c261b1

    SHA1

    66dc3aa535bc9976e4dd1655ae4b8f3cea82e42c

    SHA256

    55dd5c1afc7eae4fe39ed536c279af6dcc805d8c51535265ce1d8e594255204e

    SHA512

    7d65e8031e2b864655b9ae4fce1d5103248db9f2d9548753a7eb7f0a54986e8685f0c9d91c0105777edd0c1936fc1f9660eaca758c4513f571084d2a81d5b518

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ef9a15d978d067f4b675013b35c3f28a

    SHA1

    87e0b1dfa5d0021e674be7336ebff75e75edc485

    SHA256

    a1dd7bcdbe8f5a1be8d0dc995b061f1386dfca88dbe33f520695ef7b56446083

    SHA512

    007ff811023dbcf526a1710f1b70d98825f83dcd5722348beda7184aee32a99b6a0640090b6346c7474734942e85f910ec6ac1d2ef63cd5cc785c0f87d3e4559

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3bc2a6bf08785827b68d5a520c1ec0b2

    SHA1

    727dd45a3f6f6b91c5ee71625ad63bd72412323e

    SHA256

    83574412fc73da2d19c7869c526c099da26ac537c0e43151160532c30a8b34d1

    SHA512

    4131b2bdc168043a0dc5c6bf260f950aacd4f5e943745dbe7eb4230e78ca5bce16d10bb45da3a705f1e8c960b8b9792466ac3db746ace1f0476768c6db6bc12f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    38047572725130a617f8d25b5a62b2f9

    SHA1

    c6109e9bb5efda32545207c894c057ae071e5e9e

    SHA256

    12ee08eadb65ed4676a93c3d89dafa7eef11f26b8f218d0b97d90d3d5a68a8e7

    SHA512

    3b7061ceb36b322079e90bbf695809a498d219b8d912c1d6cdc0ca4c6cdf5af1c61b4797cca08dbca3adb6638fd378458bf8a05ed4f950c25da8ca445b0f070b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f10c5704727ca9353df8f82ce1ec7359

    SHA1

    8ad62b45381413ec6ebe851e83737b1777e4077e

    SHA256

    94eeb55dd35a8510d49527b2ce2b08fcaad8288500eac587978f570324bb09d6

    SHA512

    e258bab3d44b8dc0b2fac57f050a818cf9bf9bde1d1bf0432f147f8f7c66f7fdf2914ffdffe8cbcfe59a5aa5f3df01ecbbeb0314d8670bf261f115d99b8ba6f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b0ddca678aa09425ae61d9d98f132553

    SHA1

    17d54f1e0ecce0e279ade0ebf98948b9db335312

    SHA256

    a6c3853a0660341967a64ea569157e4803c92f0f7729a51c6d8beb95a95400b4

    SHA512

    0ba7978a9f5526ce011eb8d519e7a611823785912ca445c8a2898cc9506d2a0635d4e8fb2056df0a03759b88a8b2dbe333fb68fbec705cd4c50b7d0872b42e94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    50241bb4e78217c43785c25a880d6ff8

    SHA1

    8b8376b96b4757169ee3672a418888269a38f740

    SHA256

    dba1cbd1c0c70f03230f0cca325408feddd65f538081dee4f062bb00086b535d

    SHA512

    56a7e00b34c025a475fa94e0fd0bc2e76366d7ed75f200ef84a1f346370ea9a59f6b3e2b454616f24a9fa49ec21ca7df9a1912a823e34410872e335d01598837

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    68fe11e58c36c54572103bb333c76a3d

    SHA1

    fee9b00d9cbdab3b49aa6cb4d730cd6113aa7353

    SHA256

    fa68fe9e58dc70746fa446f67f0b091f514ae62a3378de8f62767847b585ee0f

    SHA512

    62b6ec6abd1467d411be0ab73eb869e1f7b45b0abb0017fd52ce4fb4db609e397efe1f7656abaca37e667da51586f22f4d9b2c273d78866c3872c7ec5de1ac5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    af90a04f2def7baa14a87dcc6015680c

    SHA1

    55f8b2ff137c1e44c267a037cc85d3a05cb2487e

    SHA256

    1048c8379e215f5b746d08ef39eb35c806b4516bcbb82cc886087f339f25353b

    SHA512

    21b76733fd40e38a5993215593b9550f466a4441a3d504c621533441ebfa5fcc6d95db391f9e10d15923b1c5fbd3d8edb4a0b68d34279eff828f5b34a261bb64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bba90c132838612eaf7616b2af7383e0

    SHA1

    a7f2b12c67733bf758b16a4995bd43be388b936e

    SHA256

    b25c199a29ea48be9d687ed23940c280cdd65ea19f95496da6989a133e2f1a73

    SHA512

    9981e0d987dfbd966d6ec024e767f0dc1f69fc38dcd0e86c573c5c75f04f16e268508794defa1cda039636ec3213fc4e13a2f58dcd9deb7fbfb1b6e60fae6c85

  • C:\Users\Admin\AppData\Local\Temp\CabA8B1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA9C1.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • memory/2736-2-0x0000000000200000-0x0000000000201000-memory.dmp

    Filesize

    4KB

  • memory/2736-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2736-3-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2736-4-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2744-6-0x0000000000370000-0x0000000000371000-memory.dmp

    Filesize

    4KB

  • memory/2744-9-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2744-10-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2744-12-0x0000000000400000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB