Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-01-2024 10:37
Behavioral task
behavioral1
Sample
77227a84a225e61a6d51d278079e90e1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
77227a84a225e61a6d51d278079e90e1.exe
Resource
win10v2004-20231215-en
General
-
Target
77227a84a225e61a6d51d278079e90e1.exe
-
Size
1.0MB
-
MD5
77227a84a225e61a6d51d278079e90e1
-
SHA1
b872ed09e4b45863e2bbd63b7e2d403058554392
-
SHA256
5979c60b058063a0f1b503e1220d220a4a3a262ea9c6f9d34b67d3a3a575d101
-
SHA512
7f1da23ba936bcdaaabc0795a16de607a084f6ac320fcd4962afd21c28c9270e235753cf2b22793ab14896941e8dcd6873005944ce31c1ad7944eb2b23eeb543
-
SSDEEP
24576:KNjPoavlb3o9KgGBWv2E2MwNLHN6cCFa80IgvrgI9/GB+fDj:KJoaFNJ4v2xLtcFa8015/mu
Malware Config
Extracted
metasploit
windows/download_exec
http://216.128.176.111:1280/esM7
- headers User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
resource yara_rule behavioral1/memory/2528-0-0x0000000001260000-0x0000000001453000-memory.dmp upx behavioral1/memory/2528-3-0x0000000001260000-0x0000000001453000-memory.dmp upx behavioral1/memory/2528-5-0x0000000001260000-0x0000000001453000-memory.dmp upx behavioral1/memory/2528-6-0x0000000001260000-0x0000000001453000-memory.dmp upx behavioral1/memory/2528-7-0x0000000001260000-0x0000000001453000-memory.dmp upx behavioral1/memory/2528-8-0x0000000001260000-0x0000000001453000-memory.dmp upx behavioral1/memory/2528-9-0x0000000001260000-0x0000000001453000-memory.dmp upx