Analysis

  • max time kernel
    109s
  • max time network
    113s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 15:56

General

  • Target

    fd422dd0e68311b7e19cd3a293e965179b158a1c305dbcc2c45fb3a52d93faed.exe

  • Size

    102KB

  • MD5

    8374956b75e95e4ae9e719de54e538d3

  • SHA1

    752828f1b064aee2919bfa39d9f22c8a44be64f2

  • SHA256

    fd422dd0e68311b7e19cd3a293e965179b158a1c305dbcc2c45fb3a52d93faed

  • SHA512

    927208d452be7211aadb1bb562bd35d72f39abcd78fa4ca231301fbdc445b3d5663395e6e1bbc7f55e9de451e21559639ec933775b4dcd05f964a285e1498bf7

  • SSDEEP

    3072:3indRzNyaLLU8m0btBI+C32ovc+CPNnSoer:yndRNhLMqq/7vqSoer

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.151.154.122:443

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd422dd0e68311b7e19cd3a293e965179b158a1c305dbcc2c45fb3a52d93faed.exe
    "C:\Users\Admin\AppData\Local\Temp\fd422dd0e68311b7e19cd3a293e965179b158a1c305dbcc2c45fb3a52d93faed.exe"
    1⤵
      PID:1716

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1716-54-0x0000000000400000-0x0000000000416000-memory.dmp

            Filesize

            88KB

          • memory/1716-55-0x0000000000400000-0x000000000041C000-memory.dmp

            Filesize

            112KB

          • memory/1716-57-0x00000000002B0000-0x00000000002C6000-memory.dmp

            Filesize

            88KB