Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2024 21:18

General

  • Target

    d4cae88447f83dac9a32e1b6cadc70aeb3a898beea87d474c1b8318ca0423b5d.exe

  • Size

    72KB

  • MD5

    90bcf15111c3d934a7e9e755afda2c87

  • SHA1

    0eb2017b06e1abbc21dec9b7380292c97a79b0e0

  • SHA256

    d4cae88447f83dac9a32e1b6cadc70aeb3a898beea87d474c1b8318ca0423b5d

  • SHA512

    3fe462ded713d048e3556ff41a07a3a4e4d8c09840eb5c6c41aaf9c13a127532932c86d4fae2dd5232831f83996eefa2df7f744dd3d5913685e5f74c26ac3abb

  • SSDEEP

    1536:IAGQu9p8DvTJyjvNtgGe9vxsAwizZZG3MMb+KR0Nc8QsJq39:oQgp8jAtg3tZEMe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4cae88447f83dac9a32e1b6cadc70aeb3a898beea87d474c1b8318ca0423b5d.exe
    "C:\Users\Admin\AppData\Local\Temp\d4cae88447f83dac9a32e1b6cadc70aeb3a898beea87d474c1b8318ca0423b5d.exe"
    1⤵
      PID:2696

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2696-0-0x0000000000560000-0x0000000000561000-memory.dmp
      Filesize

      4KB