Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2024 14:58
Static task
static1
Behavioral task
behavioral1
Sample
fa99d031d39f9eed5316089fc456f374777cfea5c74159cba7173924c7aefcd8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fa99d031d39f9eed5316089fc456f374777cfea5c74159cba7173924c7aefcd8.exe
Resource
win10v2004-20240226-en
General
-
Target
fa99d031d39f9eed5316089fc456f374777cfea5c74159cba7173924c7aefcd8.exe
-
Size
2.8MB
-
MD5
4a31649e04703863e6c67a2592c33e7f
-
SHA1
fb0fd051774b78c131febc8ded3cc93d5c1cd65f
-
SHA256
fa99d031d39f9eed5316089fc456f374777cfea5c74159cba7173924c7aefcd8
-
SHA512
c0125e3bbf773010db340d126620fd962f3e53ae475be0ba8463084b0fdda4b5908c34ac2b9d18351d7257d9be63215926486e7c6b0e6e5709f4676abebec9da
-
SSDEEP
49152:LtpWuJAIEIR7A55uHAP3qOwZcQIEw0ytPhuTeho/16dqbMIDu3:ZprJywZVIPpS6dqoJ
Malware Config
Extracted
metasploit
windows/download_exec
http://192.168.10.1:1234/rpc
- headers Host: Test Accept: */* User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko)
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa99d031d39f9eed5316089fc456f374777cfea5c74159cba7173924c7aefcd8.exe"C:\Users\Admin\AppData\Local\Temp\fa99d031d39f9eed5316089fc456f374777cfea5c74159cba7173924c7aefcd8.exe"1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4036 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵