Analysis
-
max time kernel
105s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 06:38
Behavioral task
behavioral1
Sample
f80309e358297b92e9a343803359f3c0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f80309e358297b92e9a343803359f3c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f80309e358297b92e9a343803359f3c0N.exe
-
Size
7KB
-
MD5
f80309e358297b92e9a343803359f3c0
-
SHA1
676ddaa5835a278ff8a6c326b24572a2d5d93ca6
-
SHA256
5154ba942fd9ec67878edc2f492ca1864b2ed6767478c9740f41033a9af75109
-
SHA512
b45f58dc1b6443fd1f7d22f0de96c9024d665f0bf013909cd363a9524808a9cb0f6ed01b84854c30698a8e6fe3c64652723ca4dd4839db8bdc13011a0bf9305e
-
SSDEEP
48:is0aS4BQn4AcrlIRaNCGqslaASD9eS/B:0+Sn/IlI6qi05eS/
Malware Config
Extracted
metasploit
metasploit_stager
192.168.30.131:8888
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4056 wrote to memory of 1048 4056 f80309e358297b92e9a343803359f3c0N.exe 83 PID 4056 wrote to memory of 1048 4056 f80309e358297b92e9a343803359f3c0N.exe 83 PID 4056 wrote to memory of 1048 4056 f80309e358297b92e9a343803359f3c0N.exe 83