Analysis
-
max time kernel
140s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 23:46
Behavioral task
behavioral1
Sample
860792c5fa0883c6a814569c5854dfcfc75d809c9e8ecf3a3f8739e8c60325dd.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
860792c5fa0883c6a814569c5854dfcfc75d809c9e8ecf3a3f8739e8c60325dd.dll
Resource
win10v2004-20240426-en
General
-
Target
860792c5fa0883c6a814569c5854dfcfc75d809c9e8ecf3a3f8739e8c60325dd.dll
-
Size
743KB
-
MD5
8e762a019dff11129354600d1a6c11e6
-
SHA1
51fb8d04a6add417685db5280345c4ef429ebfd4
-
SHA256
860792c5fa0883c6a814569c5854dfcfc75d809c9e8ecf3a3f8739e8c60325dd
-
SHA512
8db9fc3bdf0590c0320afc44efe3ec494954ecd8993c51c971b05b1ae999ede2ac8b23af7346321e1ecbca9136fcda8d151073adea967de218fbcb1ba8531560
-
SSDEEP
12288:HIBPdteSSFv+RoBHTrMm92AxIc/FeKwzWzP039A8JuRo4hU8NGjjg9MdvKwndgg5:Hmlte7v+69HMmIATeK0UkifUCyj9Pf
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.1.128:1234
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Processes:
resource yara_rule behavioral2/memory/1116-0-0x00007FF844BD0000-0x00007FF844E89000-memory.dmp upx behavioral2/memory/1116-7-0x00007FF844BD0000-0x00007FF844E89000-memory.dmp upx