Analysis
-
max time kernel
105s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 22:12
Behavioral task
behavioral1
Sample
8cd0acf8f998bb8737c2c1b0c78b8e76d04a379330837c311c3a3d710d04ef80N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8cd0acf8f998bb8737c2c1b0c78b8e76d04a379330837c311c3a3d710d04ef80N.dll
Resource
win10v2004-20240802-en
General
-
Target
8cd0acf8f998bb8737c2c1b0c78b8e76d04a379330837c311c3a3d710d04ef80N.dll
-
Size
9KB
-
MD5
146bb80776d8f19937b5023256c6e520
-
SHA1
3c91d29a47330347004ce74d3b7dce9e9f9b491e
-
SHA256
8cd0acf8f998bb8737c2c1b0c78b8e76d04a379330837c311c3a3d710d04ef80
-
SHA512
4b2c06a9d9ee069b3db1e27c989ac9a8742c49e87bd5e2b87a4f65589c156c1f6d235adf6ada17343829bc9ee84bcb3a988ee2776b52d514072e073fce1f4527
-
SSDEEP
48:q0r+l6O5aXyn/hNhx4/jC/VXq+tlqSD9C2VIb0E:dX0Zq+f95x
Malware Config
Extracted
metasploit
metasploit_stager
192.168.168.129:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1612 set thread context of 2268 1612 rundll32.exe 85 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2268 1612 rundll32.exe 85 PID 1612 wrote to memory of 2268 1612 rundll32.exe 85 PID 1612 wrote to memory of 2268 1612 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8cd0acf8f998bb8737c2c1b0c78b8e76d04a379330837c311c3a3d710d04ef80N.dll,#11⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\system32\rundll32.exerundll32.exe2⤵PID:2268
-