Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-04-2024 18:59
Static task
static1
Behavioral task
behavioral1
Sample
11fc07dc55385f3768ff5b957ede68b8429592a281e116d6e32dfc3a933f2375.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
11fc07dc55385f3768ff5b957ede68b8429592a281e116d6e32dfc3a933f2375.exe
Resource
win10v2004-20240412-en
General
-
Target
11fc07dc55385f3768ff5b957ede68b8429592a281e116d6e32dfc3a933f2375.exe
-
Size
72KB
-
MD5
54f2cc69043f3bfda0081aeb62f87dd9
-
SHA1
deeb9e3e724f70f072135187b1d64c3d46f94850
-
SHA256
11fc07dc55385f3768ff5b957ede68b8429592a281e116d6e32dfc3a933f2375
-
SHA512
99ec6a338b0e07084d5365234546438a1445b00216548cc30c0cc0631d2513b9032c24095f67a43c2297d70a33b76dcd8ec95c82825131cef781e8fe8bed89b8
-
SSDEEP
1536:I2nvmwt6RsrcMSlXlo32PUZrEM4Sh2d5Sof3Mb+KR0Nc8QsJq39:hztcrMQMDEM4XSof3e0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2820-0-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB