Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/09/2024, 06:56
Behavioral task
behavioral1
Sample
9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe
Resource
win10v2004-20240802-en
General
-
Target
9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe
-
Size
2.1MB
-
MD5
6810c0c541ef2e20132782ee2b7e2b33
-
SHA1
925a6ceb071ea3cc4ef065e96432a14b33cbf0e1
-
SHA256
9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c
-
SHA512
6d2adc3db8948936fb2c9428e1593e43b6d538d6dbc20e4ef80119975a8a34d4c2ce4b4e0d485677b84894c6f2404a411eaef883d7273873abef07e720ff22ab
-
SSDEEP
49152:PkGf7DQ2d3DiB69vLFmkZUApE/RsfpErRsZF:T7a6pFRh0ggW
Malware Config
Extracted
metasploit
metasploit_stager
192.168.207.137:5555
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe Token: SeDebugPrivilege 3008 9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe"C:\Users\Admin\AppData\Local\Temp\9bbbea634450c125820670f9032347b34a96ca17187ce2e413487e280d5bbc2c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008