Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-09-2024 14:21

General

  • Target

    7bd77fedd6dc5609eb90af89eccb0478f1225fe590d8c655604b412cfcd7c090N.exe

  • Size

    72KB

  • MD5

    f90f7d949422778b25441f36018b27b0

  • SHA1

    e0bfe8cd9908dcece33af9acc9a6c9b2a9056379

  • SHA256

    7bd77fedd6dc5609eb90af89eccb0478f1225fe590d8c655604b412cfcd7c090

  • SHA512

    83dc9d2138f05bd90efd846617fb61c404a5e94c614267ec1c7f90446ac188709c449a4457ea0f94f8c20ecfd2dac0265a21463044bad1524aae9893e57e1bc5

  • SSDEEP

    1536:I/bB8zfF506jw99b5gEumvuEUMb+KR0Nc8QsJq39:zn06jwwmvu7e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

185.202.113.6:4243

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bd77fedd6dc5609eb90af89eccb0478f1225fe590d8c655604b412cfcd7c090N.exe
    "C:\Users\Admin\AppData\Local\Temp\7bd77fedd6dc5609eb90af89eccb0478f1225fe590d8c655604b412cfcd7c090N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3448-0-0x0000000000660000-0x0000000000661000-memory.dmp

    Filesize

    4KB