Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 02:15

General

  • Target

    afe2bf1e9dcc3c4ec974745edf9ade650287e2db6b7561749cc46de07013cf5c.exe

  • Size

    72KB

  • MD5

    8825481e5b617df815424642f2f046ca

  • SHA1

    775d6152b83e8fdca5447ef5ac46e240f6da3563

  • SHA256

    afe2bf1e9dcc3c4ec974745edf9ade650287e2db6b7561749cc46de07013cf5c

  • SHA512

    77cbae769d3d1d4cec58bc5802e89f7b8614d1c83393ecbe42ba7b44004d5f8d0007b1c55a5e2600dd07b64d92b135772772c5fb62e1e1f0ba27c92063acde59

  • SSDEEP

    1536:Iuv7lx0DzOvfVRB3sBPkq/bYpWMb+KR0Nc8QsJq39:r7lCqZ3s1fbYpWe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.34.56.49:80

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\afe2bf1e9dcc3c4ec974745edf9ade650287e2db6b7561749cc46de07013cf5c.exe
    "C:\Users\Admin\AppData\Local\Temp\afe2bf1e9dcc3c4ec974745edf9ade650287e2db6b7561749cc46de07013cf5c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1972-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB