Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 16:18

General

  • Target

    executable.3496.exe

  • Size

    72KB

  • MD5

    690ea20bc3bdfb328e23005d9a80c290

  • SHA1

    ab120a232492dcfe8ff49e13f5720f63f0545dc2

  • SHA256

    b6bdfee2e621949deddfc654dacd7bb8fce78836327395249e1f9b7b5ebfcfb1

  • SHA512

    65a6f3788c7946db4ce662457a1cc5b890eef7b9bcd9a88700ab8f2000305fa1b3507e1ef1d61ead0521bcbf709cf9d98c732fe4ceb93d0cea625e26faec7f23

  • SSDEEP

    1536:IRATKZTPjBrhqbYGov23Re6JYtGMbBq3:HTKtTDrOMeYtGV

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\executable.3496.exe
    "C:\Users\Admin\AppData\Local\Temp\executable.3496.exe"
    1⤵
      PID:916

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/916-0-0x00000000004A0000-0x00000000004A1000-memory.dmp

      Filesize

      4KB