Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    14-11-2020 18:08

General

  • Target

    5b958499b0f7e27eda1e628f1122be0ea4ac505faa931e26f4ff39f6ce1c648e.exe

  • Size

    275KB

  • MD5

    24db12df9a2c5e70aa0f83eaaa2ef3ee

  • SHA1

    224c8c0c0519c9891224fa28d990cd63c8e6e457

  • SHA256

    5b958499b0f7e27eda1e628f1122be0ea4ac505faa931e26f4ff39f6ce1c648e

  • SHA512

    673fbb054f353286118ebee7776237a4774647f75adbc3e91fb11d943249f16292603ee27fe084c7789475d0b1ebf4c1ddb70e6ccdc1b5ac00cfa0e1cce17995

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://144.48.9.115:443/YCiX

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1252
      • C:\Users\Admin\AppData\Local\Temp\5b958499b0f7e27eda1e628f1122be0ea4ac505faa931e26f4ff39f6ce1c648e.exe
        "C:\Users\Admin\AppData\Local\Temp\5b958499b0f7e27eda1e628f1122be0ea4ac505faa931e26f4ff39f6ce1c648e.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2036
      • C:\Windows\System32\calc.exe
        "C:\Windows\System32\calc.exe"
        2⤵
          PID:1248

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1248-0-0x0000000000000000-mapping.dmp
      • memory/1892-1-0x000007FEF7E60000-0x000007FEF80DA000-memory.dmp
        Filesize

        2.5MB