Analysis

  • max time kernel
    134s
  • max time network
    138s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-05-2024 01:07

General

  • Target

    huj.exe

  • Size

    6KB

  • MD5

    c92b545a8473d4851312a658afe2fa64

  • SHA1

    c5f3ee25cfb067f94952b53060baa6e4a8530814

  • SHA256

    7c1fe1fd90d6f25fe822af87c1a9a21cd6e44c9e70213e4c8abc68c5189542ae

  • SHA512

    cdb7311fe09d1470d6136bbdeeed91c8b978e883da5aafb5289a7e3246a376eb38aa55d5b17a22896258ffda77c46d91d68d964e56350b0c59356d6aa405edc7

  • SSDEEP

    96:wzRQNvQefVLWS7b3uIUY1deReidtFGzNt:wUYef5WS7FwResA

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/exec

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\huj.exe
    "C:\Users\Admin\AppData\Local\Temp\huj.exe"
    1⤵
      PID:3348

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3348-0-0x00007FFE770D3000-0x00007FFE770D4000-memory.dmp

      Filesize

      4KB

    • memory/3348-1-0x00000222B0C20000-0x00000222B0C28000-memory.dmp

      Filesize

      32KB