Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
46b1fe1dab02976656f2e3af0af1f77d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46b1fe1dab02976656f2e3af0af1f77d.exe
Resource
win10v2004-20231215-en
General
-
Target
46b1fe1dab02976656f2e3af0af1f77d.exe
-
Size
170KB
-
MD5
46b1fe1dab02976656f2e3af0af1f77d
-
SHA1
90636c6fef005c5a35227576b9d39963fd708a6d
-
SHA256
7ecaa0ad4f78620738aa259d27384cd146e49f20b4f679ce3d03467b2c13da9d
-
SHA512
4235421b1cefbe13358ee55645a4c812dd46115f195ee11e76d3c701d470371b742842612baee1ab2660b2a4895342dbfb04c9bea059f2259535e6c295179709
-
SSDEEP
3072:J6GHlnAZkpAN445Lslg1oEy4RXaUCmwIiaRCUJX0:X6Nj5LInmwIftX
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2248 46b1fe1dab02976656f2e3af0af1f77d.exe Token: SeIncBasePriorityPrivilege 2248 46b1fe1dab02976656f2e3af0af1f77d.exe