Analysis

  • max time kernel
    1792s
  • max time network
    1798s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    05-05-2021 06:53

General

  • Target

    testing.exe

  • Size

    72KB

  • MD5

    b5d2585a9d50e788a37d6700ed8133cf

  • SHA1

    c6617ceea2106f76078c195a4a86cb7e6fc31507

  • SHA256

    0d1fbb35e0a41955bb9e49e3e765be71121a661ba0b374c5e352be5a87639240

  • SHA512

    70e05be3e01dc7d779f9a8313efc256af5c0819acc1d3b7d0247767ed85fa4f40aa641bf1ebc366310557e88bd9bc25144c5f9a2c8180f58ebc91a44c1d5b6e5

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

13.59.15.185:16297

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\testing.exe
    "C:\Users\Admin\AppData\Local\Temp\testing.exe"
    1⤵
      PID:1640

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1640-60-0x0000000000020000-0x0000000000021000-memory.dmp
      Filesize

      4KB

    • memory/1640-61-0x00000000002F0000-0x000000000031B000-memory.dmp
      Filesize

      172KB

    • memory/1640-62-0x0000000000390000-0x00000000003C1000-memory.dmp
      Filesize

      196KB

    • memory/1640-63-0x0000000000460000-0x00000000004BF000-memory.dmp
      Filesize

      380KB

    • memory/1640-64-0x0000000000250000-0x0000000000270000-memory.dmp
      Filesize

      128KB