Analysis
-
max time kernel
107s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 03:46
Behavioral task
behavioral1
Sample
dccce713973bcd55aa89e56db44bfc88dfef039cbf7be271e6fe1fbc8c71f923.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dccce713973bcd55aa89e56db44bfc88dfef039cbf7be271e6fe1fbc8c71f923.exe
Resource
win10v2004-20220812-en
General
-
Target
dccce713973bcd55aa89e56db44bfc88dfef039cbf7be271e6fe1fbc8c71f923.exe
-
Size
1024B
-
MD5
0bd20d4e246ed6d7fc69614752fe7455
-
SHA1
079bb95a3ee1824efac8dcc6f26ba5ef0511478d
-
SHA256
dccce713973bcd55aa89e56db44bfc88dfef039cbf7be271e6fe1fbc8c71f923
-
SHA512
96de06c012e9ecffbfe2319a70d03a47a5013cc0689492ab7643c8d5fe768a3ab1354eb232378b83430de869dda35e61970eb8c14cf29d625f0ad0986ec6f7c3
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.93.150:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.