Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 14:24
Behavioral task
behavioral1
Sample
c0922f9991b89f0d813b3ba6446083d9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c0922f9991b89f0d813b3ba6446083d9.exe
Resource
win10v2004-20231215-en
General
-
Target
c0922f9991b89f0d813b3ba6446083d9.exe
-
Size
58KB
-
MD5
c0922f9991b89f0d813b3ba6446083d9
-
SHA1
1fcc098745634000f69cee324bddc9523c42b0e4
-
SHA256
da595c58b0d93303e2fbe7cda97279c2c953b4a6326c212205076dcdb822241c
-
SHA512
cc157341217254ecaecce368c213bafc3337261c7a3daa8a68fd168ad88a3092096d5cf85cd648608364c70c957acaa9ea6e9dbaec8f40f2ed101a4ee5365665
-
SSDEEP
1536:JeZatcodBTWpZ5VkCf3EV2NGjjOr/86p2Rog:JRtcoUZbh/KshKog
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1688 1960 WerFault.exe 80 2524 1960 WerFault.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0922f9991b89f0d813b3ba6446083d9.exe"C:\Users\Admin\AppData\Local\Temp\c0922f9991b89f0d813b3ba6446083d9.exe"1⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 2402⤵
- Program crash
PID:1688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 2682⤵
- Program crash
PID:2524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1960 -ip 19601⤵PID:4672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1960 -ip 19601⤵PID:4692