Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 06:56

General

  • Target

    9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe

  • Size

    2.1MB

  • MD5

    6810c0c541ef2e20132782ee2b7e2b33

  • SHA1

    925a6ceb071ea3cc4ef065e96432a14b33cbf0e1

  • SHA256

    9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c

  • SHA512

    6d2adc3db8948936fb2c9428e1593e43b6d538d6dbc20e4ef80119975a8a34d4c2ce4b4e0d485677b84894c6f2404a411eaef883d7273873abef07e720ff22ab

  • SSDEEP

    49152:PkGf7DQ2d3DiB69vLFmkZUApE/RsfpErRsZF:T7a6pFRh0ggW

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

192.168.207.137:5555

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe
    "C:\Users\Admin\AppData\Local\Temp\9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3008

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3008-0-0x0000000140000000-0x0000000140238C0A-memory.dmp

          Filesize

          2.2MB

        • memory/3008-1-0x000007FEF6653000-0x000007FEF6654000-memory.dmp

          Filesize

          4KB

        • memory/3008-2-0x0000000000250000-0x0000000000284000-memory.dmp

          Filesize

          208KB

        • memory/3008-3-0x000007FEF6650000-0x000007FEF703C000-memory.dmp

          Filesize

          9.9MB

        • memory/3008-4-0x000007FEF6650000-0x000007FEF703C000-memory.dmp

          Filesize

          9.9MB

        • memory/3008-5-0x000007FEF6650000-0x000007FEF703C000-memory.dmp

          Filesize

          9.9MB

        • memory/3008-7-0x00000000002A0000-0x00000000002AA000-memory.dmp

          Filesize

          40KB

        • memory/3008-6-0x00000000002A0000-0x00000000002AA000-memory.dmp

          Filesize

          40KB

        • memory/3008-8-0x000007FEF6650000-0x000007FEF703C000-memory.dmp

          Filesize

          9.9MB

        • memory/3008-12-0x000007FEF6650000-0x000007FEF703C000-memory.dmp

          Filesize

          9.9MB

        • memory/3008-31-0x000007FEF6653000-0x000007FEF6654000-memory.dmp

          Filesize

          4KB

        • memory/3008-32-0x000007FEF6650000-0x000007FEF703C000-memory.dmp

          Filesize

          9.9MB

        • memory/3008-33-0x000007FEF6650000-0x000007FEF703C000-memory.dmp

          Filesize

          9.9MB

        • memory/3008-34-0x000007FEF6650000-0x000007FEF703C000-memory.dmp

          Filesize

          9.9MB

        • memory/3008-35-0x00000000002A0000-0x00000000002AA000-memory.dmp

          Filesize

          40KB

        • memory/3008-36-0x00000000002A0000-0x00000000002AA000-memory.dmp

          Filesize

          40KB

        • memory/3008-37-0x000007FEF6650000-0x000007FEF703C000-memory.dmp

          Filesize

          9.9MB

        • memory/3008-38-0x000007FEF6650000-0x000007FEF703C000-memory.dmp

          Filesize

          9.9MB

        • memory/3008-39-0x0000000140000000-0x0000000140238C0A-memory.dmp

          Filesize

          2.2MB