Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 16:43
Static task
static1
Behavioral task
behavioral1
Sample
6c29bc08b1c4fe8692e8f830ff8c4df61d8cecec91890317dff93fb48c08792b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
6c29bc08b1c4fe8692e8f830ff8c4df61d8cecec91890317dff93fb48c08792b.exe
Resource
win10v2004-20220414-en
General
-
Target
6c29bc08b1c4fe8692e8f830ff8c4df61d8cecec91890317dff93fb48c08792b.exe
-
Size
82KB
-
MD5
f7c54c6e608ac30220ef843fe4fcf67f
-
SHA1
6cd64f73a6c4cb32c2c7fe11ade0c8498759a7da
-
SHA256
6c29bc08b1c4fe8692e8f830ff8c4df61d8cecec91890317dff93fb48c08792b
-
SHA512
775b321edef3fa709b713c285b2b97635b9c538f799c4e33c6e99d96821f23d2427c1dbff84a5ba3a73868f67ad7dd4e8a6e1529c3e34b05cf2d0f7a4eee39a3
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1192-54-0x0000000001000000-0x0000000001017D00-memory.dmpFilesize
95KB