Analysis
-
max time kernel
27s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
29-05-2022 16:41
Static task
static1
Behavioral task
behavioral1
Sample
0daa391a7ced1527a38b7bfcbbe9998d19fc6b9aab60d3bfdcf3f13d9df1859b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0daa391a7ced1527a38b7bfcbbe9998d19fc6b9aab60d3bfdcf3f13d9df1859b.exe
Resource
win10v2004-20220414-en
General
-
Target
0daa391a7ced1527a38b7bfcbbe9998d19fc6b9aab60d3bfdcf3f13d9df1859b.exe
-
Size
2.3MB
-
MD5
5b3685025d690e226948be017a1d4aee
-
SHA1
100628a63e150c4a7d30b89068037b66269981ec
-
SHA256
0daa391a7ced1527a38b7bfcbbe9998d19fc6b9aab60d3bfdcf3f13d9df1859b
-
SHA512
390e301b7c6c3276f8b91285c390ea46b0443e5b64209f9d83e40b2f40e03091d8834020424a005882b06c7b12ebdde3fc62d04c638446083dbc37c834653121
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
165.22.98.128:1123
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Processes:
resource yara_rule behavioral1/memory/1904-54-0x0000000000400000-0x000000000075D000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 900 1904 WerFault.exe 0daa391a7ced1527a38b7bfcbbe9998d19fc6b9aab60d3bfdcf3f13d9df1859b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
0daa391a7ced1527a38b7bfcbbe9998d19fc6b9aab60d3bfdcf3f13d9df1859b.exedescription pid process target process PID 1904 wrote to memory of 900 1904 0daa391a7ced1527a38b7bfcbbe9998d19fc6b9aab60d3bfdcf3f13d9df1859b.exe WerFault.exe PID 1904 wrote to memory of 900 1904 0daa391a7ced1527a38b7bfcbbe9998d19fc6b9aab60d3bfdcf3f13d9df1859b.exe WerFault.exe PID 1904 wrote to memory of 900 1904 0daa391a7ced1527a38b7bfcbbe9998d19fc6b9aab60d3bfdcf3f13d9df1859b.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0daa391a7ced1527a38b7bfcbbe9998d19fc6b9aab60d3bfdcf3f13d9df1859b.exe"C:\Users\Admin\AppData\Local\Temp\0daa391a7ced1527a38b7bfcbbe9998d19fc6b9aab60d3bfdcf3f13d9df1859b.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1904 -s 402⤵
- Program crash