Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 09:27

General

  • Target

    90c231c3e1a5d1ebd52e91f65689f5ee507774be3010ea4b6cd8f217cdd8c6fc.exe

  • Size

    1.2MB

  • MD5

    630052662262561cc0edc574c7767425

  • SHA1

    bc5c1bb9a5a22af1be45727b4cb928d686b70963

  • SHA256

    90c231c3e1a5d1ebd52e91f65689f5ee507774be3010ea4b6cd8f217cdd8c6fc

  • SHA512

    622cf0e9ffea7ce1518be921d2f3f5da6d2ede5fe15a864583b87d0caaedd86bdbf0349d3c6a7ff6bb1f7b927014b992ae48ee36abae68f18833b143726240fc

  • SSDEEP

    24576:RperjTDxsQFWCcTJPOsJshCjvc79BZycL36NQwd9Zv+kq1yUGlFbGL:RsYVT4eXve1y1m

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://182.43.182.187:30088/kPh9

Attributes
  • headers User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; SV1)

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\90c231c3e1a5d1ebd52e91f65689f5ee507774be3010ea4b6cd8f217cdd8c6fc.exe
    "C:\Users\Admin\AppData\Local\Temp\90c231c3e1a5d1ebd52e91f65689f5ee507774be3010ea4b6cd8f217cdd8c6fc.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2532-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB