Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11-06-2022 13:10
Static task
static1
Behavioral task
behavioral1
Sample
e79d48bc650a2e1bd36d73f438826b8d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e79d48bc650a2e1bd36d73f438826b8d.exe
Resource
win10v2004-20220414-en
General
-
Target
e79d48bc650a2e1bd36d73f438826b8d.exe
-
Size
71KB
-
MD5
e79d48bc650a2e1bd36d73f438826b8d
-
SHA1
191e1644ca6b40fd8469d8013e4f931ac9877c18
-
SHA256
5f3916cde8f3852fc370be7442e668f31a0d676f2ae912f88042481f972cc26a
-
SHA512
7451442c8ff56ce0124efe429afbba480c71e56247f5cbebe83a0aa7107e9e3c3f68e891dfa928d1fc47be8c5fd715f59ebd252cf4d3d06f1eb471f6d422948d
Malware Config
Extracted
metasploit
metasploit_stager
51.75.89.111:50438
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
suricata: ET MALWARE Possible Metasploit Payload Common Construct Bind_API (from server)
suricata: ET MALWARE Possible Metasploit Payload Common Construct Bind_API (from server)
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
e79d48bc650a2e1bd36d73f438826b8d.exedescription pid process target process PID 664 wrote to memory of 1908 664 e79d48bc650a2e1bd36d73f438826b8d.exe svchost.exe PID 664 wrote to memory of 1908 664 e79d48bc650a2e1bd36d73f438826b8d.exe svchost.exe PID 664 wrote to memory of 1908 664 e79d48bc650a2e1bd36d73f438826b8d.exe svchost.exe PID 664 wrote to memory of 1908 664 e79d48bc650a2e1bd36d73f438826b8d.exe svchost.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1908-54-0x0000000000000000-mapping.dmp
-
memory/1908-55-0x0000000000190000-0x00000000001C5000-memory.dmpFilesize
212KB
-
memory/1908-56-0x00000000001D0000-0x000000000020B000-memory.dmpFilesize
236KB
-
memory/1908-58-0x0000000000590000-0x0000000000690000-memory.dmpFilesize
1024KB
-
memory/1908-59-0x00000000003D0000-0x000000000042F000-memory.dmpFilesize
380KB
-
memory/1908-60-0x00000000004E9000-0x0000000000584000-memory.dmpFilesize
620KB
-
memory/1908-61-0x0000000000508000-0x000000000052A000-memory.dmpFilesize
136KB
-
memory/1908-62-0x0000000000210000-0x0000000000237000-memory.dmpFilesize
156KB
-
memory/1908-63-0x00000000001D0000-0x000000000020B000-memory.dmpFilesize
236KB
-
memory/1908-64-0x0000000000590000-0x0000000000690000-memory.dmpFilesize
1024KB