Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2023, 20:42
Behavioral task
behavioral1
Sample
4dad41d722ac8507714ce138b72bf96c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4dad41d722ac8507714ce138b72bf96c.exe
Resource
win10v2004-20230220-en
General
-
Target
4dad41d722ac8507714ce138b72bf96c.exe
-
Size
72KB
-
MD5
4dad41d722ac8507714ce138b72bf96c
-
SHA1
91105b00a10b13525d8f3d1428fc147851e7da6e
-
SHA256
d31c3152837a19700b108291ab821b3b06a9459dda12cb90267bfd6d2090a377
-
SHA512
4ac8a1b5341f6e43538a5ff0c4c2402952882a66f9e5c9aab8be3f6d6cae5bb07ee096eb810e579824d8a583828724cbf2ccc7c45d6442c5908f3bf1e8968fe1
-
SSDEEP
1536:IwX1x33bD7f4+YlOUnkBHgg6WFMb+KR0Nc8QsJq39:Vf37fTUkHggze0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
3.137.123.63:28193
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1668 4dad41d722ac8507714ce138b72bf96c.exe 1668 4dad41d722ac8507714ce138b72bf96c.exe 1668 4dad41d722ac8507714ce138b72bf96c.exe 1668 4dad41d722ac8507714ce138b72bf96c.exe 1668 4dad41d722ac8507714ce138b72bf96c.exe 1668 4dad41d722ac8507714ce138b72bf96c.exe 3764 notepad.exe 3764 notepad.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1668 4dad41d722ac8507714ce138b72bf96c.exe Token: SeDebugPrivilege 1668 4dad41d722ac8507714ce138b72bf96c.exe Token: SeDebugPrivilege 1668 4dad41d722ac8507714ce138b72bf96c.exe Token: SeDebugPrivilege 1668 4dad41d722ac8507714ce138b72bf96c.exe Token: SeDebugPrivilege 3764 notepad.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1668 wrote to memory of 3764 1668 4dad41d722ac8507714ce138b72bf96c.exe 88 PID 1668 wrote to memory of 3764 1668 4dad41d722ac8507714ce138b72bf96c.exe 88 PID 1668 wrote to memory of 3764 1668 4dad41d722ac8507714ce138b72bf96c.exe 88 PID 1668 wrote to memory of 3764 1668 4dad41d722ac8507714ce138b72bf96c.exe 88 PID 1668 wrote to memory of 3764 1668 4dad41d722ac8507714ce138b72bf96c.exe 88 PID 1668 wrote to memory of 3764 1668 4dad41d722ac8507714ce138b72bf96c.exe 88 PID 1668 wrote to memory of 3764 1668 4dad41d722ac8507714ce138b72bf96c.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dad41d722ac8507714ce138b72bf96c.exe"C:\Users\Admin\AppData\Local\Temp\4dad41d722ac8507714ce138b72bf96c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\notepad.exeC:\Windows\System32\notepad.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3764
-