Analysis
-
max time kernel
117s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
b73ebfcc8d932795d863e029395997c3f9a985d198737f38ccfd428eb6f1446d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b73ebfcc8d932795d863e029395997c3f9a985d198737f38ccfd428eb6f1446d.exe
Resource
win10v2004-20220901-en
General
-
Target
b73ebfcc8d932795d863e029395997c3f9a985d198737f38ccfd428eb6f1446d.exe
-
Size
151KB
-
MD5
cc660caa2eda560c73609a71e25e2903
-
SHA1
01423810934fccf85572863e38d00f5b910b8c6e
-
SHA256
b73ebfcc8d932795d863e029395997c3f9a985d198737f38ccfd428eb6f1446d
-
SHA512
16b0cf44489a9a7dda5b923ca97c388a0a86f419ce96c4d027e7d9aea74cc3ec5338b483d3713afd132cf0f33ee2dfa0e024da93932df7068443ba9ee6dc1f7b
-
SSDEEP
3072:xzFPl85yWm66s151dwDEPPmfMTPw7KpKT9xdJ+96:xzNySoZdwaAMTwWl9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
54.83.198.76:443
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 2 IoCs
pid Process 1776 Notepad.exe 1388 dialogbox.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1776 Notepad.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1776 1492 b73ebfcc8d932795d863e029395997c3f9a985d198737f38ccfd428eb6f1446d.exe 27 PID 1492 wrote to memory of 1776 1492 b73ebfcc8d932795d863e029395997c3f9a985d198737f38ccfd428eb6f1446d.exe 27 PID 1492 wrote to memory of 1776 1492 b73ebfcc8d932795d863e029395997c3f9a985d198737f38ccfd428eb6f1446d.exe 27 PID 1492 wrote to memory of 1776 1492 b73ebfcc8d932795d863e029395997c3f9a985d198737f38ccfd428eb6f1446d.exe 27 PID 1492 wrote to memory of 1388 1492 b73ebfcc8d932795d863e029395997c3f9a985d198737f38ccfd428eb6f1446d.exe 29 PID 1492 wrote to memory of 1388 1492 b73ebfcc8d932795d863e029395997c3f9a985d198737f38ccfd428eb6f1446d.exe 29 PID 1492 wrote to memory of 1388 1492 b73ebfcc8d932795d863e029395997c3f9a985d198737f38ccfd428eb6f1446d.exe 29 PID 1492 wrote to memory of 1388 1492 b73ebfcc8d932795d863e029395997c3f9a985d198737f38ccfd428eb6f1446d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b73ebfcc8d932795d863e029395997c3f9a985d198737f38ccfd428eb6f1446d.exe"C:\Users\Admin\AppData\Local\Temp\b73ebfcc8d932795d863e029395997c3f9a985d198737f38ccfd428eb6f1446d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\Notepad.exe"C:\Users\Admin\AppData\Local\Temp\Notepad.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\dialogbox.exe"C:\Users\Admin\AppData\Local\Temp\dialogbox.exe"2⤵
- Executes dropped EXE
PID:1388
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD5231a32342ecf5c86af5aca41bcdd3aef
SHA14293f73039898e482784868ad50573baa69328b9
SHA2568b0898b30ea74f7b88fd0625bfaadb755c118ae58da7e1f6a0c298f6612ded04
SHA5122014488f5499004d7109f86d9b7b040bbe5a97fa32a78197302ff1183bce0cb47d239ac7bd6972372f3223edb0a452e603635581b8d5d7feccadb862b122c125
-
Filesize
7KB
MD591fb5483f9d682cce0cf8d995d33ee2c
SHA146ce4f8c574d646feae76493933dc580bf9f0fec
SHA256bd79234e1a54031bc125e8867156f1c63354576d4e72f9ee907cb7fa9f32a3ae
SHA512738f8c4150ba40e2837c8dbd84d5b67c5b6c32ea2a536d124df9c0a1ef7016d5f01eac703daf984fc6448d56a0eb4a89a434c543bafa18e00eb91bd3ea17820f
-
Filesize
7KB
MD591fb5483f9d682cce0cf8d995d33ee2c
SHA146ce4f8c574d646feae76493933dc580bf9f0fec
SHA256bd79234e1a54031bc125e8867156f1c63354576d4e72f9ee907cb7fa9f32a3ae
SHA512738f8c4150ba40e2837c8dbd84d5b67c5b6c32ea2a536d124df9c0a1ef7016d5f01eac703daf984fc6448d56a0eb4a89a434c543bafa18e00eb91bd3ea17820f