Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-07-2022 15:23

General

  • Target

    523329753a81aa8ce56ca98b5db240a71a58d309ac1b82775fe59012c3b70886.exe

  • Size

    19KB

  • MD5

    63008f8d91f64fa0a818c40a9aec4369

  • SHA1

    b572b54f4ec290da1a844b6cd1f4f822d041b458

  • SHA256

    523329753a81aa8ce56ca98b5db240a71a58d309ac1b82775fe59012c3b70886

  • SHA512

    7a791287bdecdd5c71b6ba29f6f6c98c376268f7b409a07ca49c7ac53c4968447cb149709d8ccef961829e5caba1a87e81c1a96ee4471e954f8c7acf47322215

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

192.168.3.11:1234

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\523329753a81aa8ce56ca98b5db240a71a58d309ac1b82775fe59012c3b70886.exe
    "C:\Users\Admin\AppData\Local\Temp\523329753a81aa8ce56ca98b5db240a71a58d309ac1b82775fe59012c3b70886.exe"
    1⤵
      PID:4216

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4216-130-0x0000000000610000-0x0000000000710000-memory.dmp
      Filesize

      1024KB

    • memory/4216-131-0x0000000000610000-0x0000000000710000-memory.dmp
      Filesize

      1024KB