Analysis

  • max time kernel
    115s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 03:18

General

  • Target

    a1bc48d75bee7b2afcd7e035effda4960d9346f7fd087b05a53cc0ca539175f2.exe

  • Size

    313KB

  • MD5

    ab99d86641bc4e215cd5c5cb7901f296

  • SHA1

    60ae30ec44ee3eb2d057717ccaf7ad2b0b5cdb81

  • SHA256

    a1bc48d75bee7b2afcd7e035effda4960d9346f7fd087b05a53cc0ca539175f2

  • SHA512

    23a129543a547cc147b20d55e8bd8657cc6e400bb048825220e033ed9e7e0552c6981eb4a8cfb309b78cf8ae72e3f164fc355a9c4acace4ded291c1dfcd95c7a

Malware Config

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Modifies registry class 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1bc48d75bee7b2afcd7e035effda4960d9346f7fd087b05a53cc0ca539175f2.exe
    "C:\Users\Admin\AppData\Local\Temp\a1bc48d75bee7b2afcd7e035effda4960d9346f7fd087b05a53cc0ca539175f2.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4556

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4556-130-0x0000000000C50000-0x0000000000C66000-memory.dmp
    Filesize

    88KB

  • memory/4556-134-0x0000000000C30000-0x0000000000C48000-memory.dmp
    Filesize

    96KB