Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 08:08
Static task
static1
Behavioral task
behavioral1
Sample
f2db3a6a245c58f386bd671cc1707d566e3bec948c074271357155e34cb4c6bf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f2db3a6a245c58f386bd671cc1707d566e3bec948c074271357155e34cb4c6bf.exe
Resource
win10v2004-20220414-en
General
-
Target
f2db3a6a245c58f386bd671cc1707d566e3bec948c074271357155e34cb4c6bf.exe
-
Size
2.5MB
-
MD5
6d28599e853922b79fb2b2b2da27b4a4
-
SHA1
b996c92127b7ab992b9b6459905fb8e3f1871f5a
-
SHA256
f2db3a6a245c58f386bd671cc1707d566e3bec948c074271357155e34cb4c6bf
-
SHA512
1a1e9d8ef39564397d171f0fa1495ed20d5624dd7955247e686cfe3d7b97e7a36baef8b93ab25d6ed288da1897f0cdf945dba513ddbfdbd78ce58b71e1495659
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.178.25:1111
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Processes:
resource yara_rule behavioral1/memory/1504-54-0x0000000000400000-0x00000000006A8000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1504-54-0x0000000000400000-0x00000000006A8000-memory.dmpFilesize
2.7MB