Analysis
-
max time kernel
40s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
10-05-2022 23:18
Static task
static1
Behavioral task
behavioral1
Sample
bfb754fae72d258192978d5572128efa2cb5fda2f2707ceffb04a83bde0065e4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
bfb754fae72d258192978d5572128efa2cb5fda2f2707ceffb04a83bde0065e4.exe
Resource
win10v2004-20220414-en
General
-
Target
bfb754fae72d258192978d5572128efa2cb5fda2f2707ceffb04a83bde0065e4.exe
-
Size
235KB
-
MD5
ebc89c8dab7004b77351070a741d41af
-
SHA1
817cb28a043511af178601d9f06c2d8095468113
-
SHA256
bfb754fae72d258192978d5572128efa2cb5fda2f2707ceffb04a83bde0065e4
-
SHA512
1e5308bb15afcbc609104ee2143885a28faaf87a88dc7abf9435adeaf7a55054c2bc4122e4d8e91dbe081381d1b214a2212fdccf9b7f806ad1b51ec641841978
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_http
http://192.168.1.105:4443/SDuFNWMnRYXg5eHkv4hSIguJjH4g8hPF6EvI0TG5ziAWOah8qj7mNqKHOSO3qi8P9YJd3uZReD-fmnZGbV_K1xvi9kf
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
bfb754fae72d258192978d5572128efa2cb5fda2f2707ceffb04a83bde0065e4.exedescription pid process Token: SeDebugPrivilege 536 bfb754fae72d258192978d5572128efa2cb5fda2f2707ceffb04a83bde0065e4.exe