Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 22:53

General

  • Target

    ce756ff0429c66717f97f52d14ad7c48478c373c26a1187e486a6b8e13a95d9a.exe

  • Size

    39KB

  • MD5

    da3f4ff88c540c8647d8ba8881e42b0d

  • SHA1

    0ba6f266641d322f8da83d9030307a4d87303bbc

  • SHA256

    ce756ff0429c66717f97f52d14ad7c48478c373c26a1187e486a6b8e13a95d9a

  • SHA512

    cc2bf841de29edae9edabeb22722d9e4bca69a75b0aad533c01ad33b28cdd5c8db4f6e3889b39c4d75cf38f1488065cf3d3ef029c02ceb329f06cc01304be707

  • SSDEEP

    384:qg6CU4H6c3WSpsYkmQMnkcgnDGXr3wPhkpp7v07MByD23YZehtI:qg654ac3HpvkmQ438CyhqpAIByDrYh

Malware Config

Extracted

Family

metasploit

Version

windows/shell_bind_tcp

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce756ff0429c66717f97f52d14ad7c48478c373c26a1187e486a6b8e13a95d9a.exe
    "C:\Users\Admin\AppData\Local\Temp\ce756ff0429c66717f97f52d14ad7c48478c373c26a1187e486a6b8e13a95d9a.exe"
    1⤵
      PID:1992

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1992-0-0x0000000000070000-0x0000000000090000-memory.dmp

      Filesize

      128KB

    • memory/1992-1-0x0000000000070000-0x0000000000090000-memory.dmp

      Filesize

      128KB