Analysis

  • max time kernel
    90s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2022 08:01

General

  • Target

    d87c5bdb9fda2a4883a09cb4007875608da6f83ffde8961d3b9015ba357fef87.exe

  • Size

    1.4MB

  • MD5

    8fb721e6b0407cb07f8eb40a91a77dcd

  • SHA1

    bb06283422b1b4f2000e4443042dc69c9c273b29

  • SHA256

    d87c5bdb9fda2a4883a09cb4007875608da6f83ffde8961d3b9015ba357fef87

  • SHA512

    24553f0651a16cb2684ad9c7906412341cde94f2619631c0f1570e9f5f17907284c1841d0c0f17eced39a5be15612b5466b1d8f6153bfc146796a3230d7f0e33

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

192.168.56.105:6666

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d87c5bdb9fda2a4883a09cb4007875608da6f83ffde8961d3b9015ba357fef87.exe
    "C:\Users\Admin\AppData\Local\Temp\d87c5bdb9fda2a4883a09cb4007875608da6f83ffde8961d3b9015ba357fef87.exe"
    1⤵
      PID:3196

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3196-130-0x00007FF7A2A60000-0x00007FF7A2C29000-memory.dmp

      Filesize

      1.8MB