Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 10:29
Behavioral task
behavioral1
Sample
45ff65377f2e4f0dae3a3c0d49364102.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
45ff65377f2e4f0dae3a3c0d49364102.exe
Resource
win10v2004-20231222-en
General
-
Target
45ff65377f2e4f0dae3a3c0d49364102.exe
-
Size
160KB
-
MD5
45ff65377f2e4f0dae3a3c0d49364102
-
SHA1
67f50555a5f4f355d7df44949fdcaf43be869d59
-
SHA256
f053093d38b9681e4f80eb300afb5f48a22e26fafe6454709b862f72984c763b
-
SHA512
aa4e81457631e0fe9f2accdd2391ffe1f5e4e499d95f2e5592d3676f1cf3a0e0586549669319a0795b42fafd7398b5a20b3e0e76612e5b4340d0f5a2da1e8278
-
SSDEEP
3072:Zb55PrDvjFOEpQmdJpWI7wXhzXeftBdXBdLCu4R367uPlDKw:ZbDj1dJpF7wXhzOpXBdL9O367Y+
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1280 3260 WerFault.exe 16 1496 3260 WerFault.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\45ff65377f2e4f0dae3a3c0d49364102.exe"C:\Users\Admin\AppData\Local\Temp\45ff65377f2e4f0dae3a3c0d49364102.exe"1⤵PID:3260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3260 -s 12322⤵
- Program crash
PID:1280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3260 -s 12442⤵
- Program crash
PID:1496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3260 -ip 32601⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3260 -ip 32601⤵PID:3392