Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
16/01/2024, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
60616cf471983a88b11f6fd22f4f55e3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
60616cf471983a88b11f6fd22f4f55e3.exe
Resource
win10v2004-20231215-en
General
-
Target
60616cf471983a88b11f6fd22f4f55e3.exe
-
Size
72KB
-
MD5
60616cf471983a88b11f6fd22f4f55e3
-
SHA1
01dc5f17842ba206613750f2545ae201693c9ac8
-
SHA256
38224b742b3ef8a4dd1b1cfb8de9efb5549ac7410f242a73a0f01be29dd11aca
-
SHA512
ed2378957d6558b9c78d8dadb35857990e0e2838f2de469a9c0b8c8ebe52069d06cefe756d2c54f397cee6ddaf2ce7ea5724b752d21d9765325469d624d22428
-
SSDEEP
1536:IgdrxNrdI+bl5rL89IovYmqpMb+KR0Nc8QsJq39:DdNN/BdhdmYe0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2604 4948 WerFault.exe 66 3440 4948 WerFault.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\60616cf471983a88b11f6fd22f4f55e3.exe"C:\Users\Admin\AppData\Local\Temp\60616cf471983a88b11f6fd22f4f55e3.exe"1⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 2602⤵
- Program crash
PID:2604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 2682⤵
- Program crash
PID:3440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4948 -ip 49481⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4948 -ip 49481⤵PID:5052