Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2024 02:17

General

  • Target

    c14199ea82a4343bc050e5ec8fef4fa51ee3002f67b6b4bbf533b923a2448771.exe

  • Size

    4KB

  • MD5

    699512a81a0039d3197306a0f2111adb

  • SHA1

    1bfb31ae0e93bdc71b20ed79b71c8022e92459e4

  • SHA256

    c14199ea82a4343bc050e5ec8fef4fa51ee3002f67b6b4bbf533b923a2448771

  • SHA512

    818047c78834d4d8d74d1511eca933a34852cccf1909127405e131632e315eff85f0b5be989a3121708f69153aea600c9bcf3c2d34031ea063d5b6d32cb0b99c

  • SSDEEP

    96:nNlMceAfNAC5KphOIKN6N0fR87Opulltkb1o3m:/M6fLQzKjfR8yKlmbG3m

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c14199ea82a4343bc050e5ec8fef4fa51ee3002f67b6b4bbf533b923a2448771.exe
    "C:\Users\Admin\AppData\Local\Temp\c14199ea82a4343bc050e5ec8fef4fa51ee3002f67b6b4bbf533b923a2448771.exe"
    1⤵
      PID:2072

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2072-0-0x0000000000400000-0x0000000000404000-memory.dmp
      Filesize

      16KB