Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 08:14
Static task
static1
Behavioral task
behavioral1
Sample
level2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
level2.exe
Resource
win10v2004-20240426-en
General
-
Target
level2.exe
-
Size
17KB
-
MD5
b33671101b91df7eed20f8d09d2c3098
-
SHA1
d38fd250275c85e76a438c5f79617b915dd3cff9
-
SHA256
f643dc8d53ed53a2287c0c101867f73e7d7f60e74fc602c79f95f88a79279684
-
SHA512
c3777506612ad1a48ebe636083dea6286720114c2e8e78cb308640f3870cb44b43ce7f4db50a4e16f12b08d763b66365f6606f773912e7ce1d20a3ac3041c8c3
-
SSDEEP
192:LTowfoTZGB5VEvxRqM6aDql9xFezQiABg1g+FM5NooqlUUKiaAws681e3Q5XfMc6:LToPtGBsvxzzDYOQ/B+NW5NpHx3j
Malware Config
Extracted
metasploit
metasploit_stager
192.168.122.1:31337
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3672-0-0x000001682F1F0000-0x000001682F1F1000-memory.dmpFilesize
4KB