Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 13:15
Behavioral task
behavioral1
Sample
d9700930575bf941ac7afe77e0076d56d19fce917de1275d80d361080354873d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d9700930575bf941ac7afe77e0076d56d19fce917de1275d80d361080354873d.exe
Resource
win10v2004-20240508-en
General
-
Target
d9700930575bf941ac7afe77e0076d56d19fce917de1275d80d361080354873d.exe
-
Size
2.0MB
-
MD5
b116e37402da9c4f533eb5b4de2867ca
-
SHA1
98239389b1252df2555dd656ceda95828668c32b
-
SHA256
d9700930575bf941ac7afe77e0076d56d19fce917de1275d80d361080354873d
-
SHA512
b83b7d6e57c2a0bf55768215b55486681093dfb1962163bf260766cec4e04bf59a9de465b75fdb9237cdb97d825fdbd753bd7e4783399a7d5e0ab86767ad98cd
-
SSDEEP
49152:afEXl9lLEfP0QERBf23GKNaNyEyI+SiSU:O0bE0QER523LNrSi
Malware Config
Extracted
metasploit
metasploit_stager
10.10.16.14:9001
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Processes:
resource yara_rule behavioral1/memory/2928-0-0x0000000000EA0000-0x0000000001467000-memory.dmp upx behavioral1/memory/2928-3-0x0000000000EA0000-0x0000000001467000-memory.dmp upx