Analysis
-
max time kernel
110s -
max time network
113s -
platform
windows10-1703_x64 -
resource
win10-20230220-es -
resource tags
arch:x64arch:x86image:win10-20230220-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
26/05/2023, 10:46
Behavioral task
behavioral1
Sample
secnhack.exe
Resource
win10-20230220-es
3 signatures
150 seconds
General
-
Target
secnhack.exe
-
Size
72KB
-
MD5
8f11186e6fdbb15d0299e93fbb730cf0
-
SHA1
e31bfc22fd3976bda9a3636b7936315de1412a1c
-
SHA256
c3ce48d7587e0116590d3c965c36e85e3c4d96293c8cf997e162b543baeb7e87
-
SHA512
a7b4a1581b57ed457f260beb45cae88bb87298bbb3ce92fa1cbfca66bd5bd1da9215c6e3988f686ea4bedcb51bd97a55997f12b782a4a2b507d78d2d19334216
-
SSDEEP
1536:ITFJA3T5LJDiUuCHwhIOaMF7I76A2JPdWXMb+KR0Nc8QsJq39:+AdViiHz72IT8oe0Nc8QsC9
Score
10/10
Malware Config
Extracted
Family
metasploit
Version
windows/reverse_tcp
C2
209.25.141.180:36930
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4324 secnhack.exe 4324 secnhack.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4324 secnhack.exe