Analysis
-
max time kernel
144s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-07-2022 17:41
Static task
static1
Behavioral task
behavioral1
Sample
5e2a0e82cf16b17ee9604f394914ab14ad04d0ee4ea533e98b1e32170cf11efb.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5e2a0e82cf16b17ee9604f394914ab14ad04d0ee4ea533e98b1e32170cf11efb.exe
Resource
win10v2004-20220414-en
General
-
Target
5e2a0e82cf16b17ee9604f394914ab14ad04d0ee4ea533e98b1e32170cf11efb.exe
-
Size
37KB
-
MD5
2539e15bb5d8dac8f084e891530da8be
-
SHA1
6e36a510d61f7afddf089fc3f10171a127fba292
-
SHA256
5e2a0e82cf16b17ee9604f394914ab14ad04d0ee4ea533e98b1e32170cf11efb
-
SHA512
2dd16cc9f0dbcd64b47f5139ff47a1c63e9c446c59b239073af856978a552c719799678a90bb53ff57e60d69f9b024883527481a1e4c50a5996671a9ee0775d3
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_bind_tcp
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4740-130-0x0000000000B70000-0x0000000000B8E000-memory.dmpFilesize
120KB