Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 10:19

General

  • Target

    56c92e2756fc4fcfa0d720693ad3740623273143f98eae718f5e27fd3e215c4f.exe

  • Size

    15.3MB

  • MD5

    0f47fc940c729314b7a7f2035b7d6a48

  • SHA1

    00720adf9cd74ff574cb3df236e27cd6316a88ed

  • SHA256

    56c92e2756fc4fcfa0d720693ad3740623273143f98eae718f5e27fd3e215c4f

  • SHA512

    316297788cc52cd71bc2822da1eaa8ee89e3ba051099dc01881b9be694b9b4df6fbe16abf6342cde9da085594b4dc8d9933fc64bdd70342b283aa9d92f1553e2

  • SSDEEP

    196608:KppJWUQok3elSdnqdVirdfOFIUuEWpBZjbqsH24W2Ny8Urt7MFoM1hUA36+B4X:epJNxlUAiZLUwDt2sW4WoI1MFoM8X

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

10.0.20.30:9999

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56c92e2756fc4fcfa0d720693ad3740623273143f98eae718f5e27fd3e215c4f.exe
    "C:\Users\Admin\AppData\Local\Temp\56c92e2756fc4fcfa0d720693ad3740623273143f98eae718f5e27fd3e215c4f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3912

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3912-0-0x00007FFDB64B0000-0x00007FFDB64B2000-memory.dmp
    Filesize

    8KB

  • memory/3912-1-0x0000000000DF0000-0x0000000002935000-memory.dmp
    Filesize

    27.3MB

  • memory/3912-9-0x0000000000DF0000-0x0000000002935000-memory.dmp
    Filesize

    27.3MB

  • memory/3912-13-0x0000000000DF0000-0x0000000002935000-memory.dmp
    Filesize

    27.3MB

  • memory/3912-14-0x000001AD45D10000-0x000001AD45D11000-memory.dmp
    Filesize

    4KB

  • memory/3912-15-0x0000000000DF0000-0x0000000002935000-memory.dmp
    Filesize

    27.3MB