Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-09-2024 18:20

General

  • Target

    f230475fc30f6b8ab711a8582802c52d.exe

  • Size

    45KB

  • MD5

    f230475fc30f6b8ab711a8582802c52d

  • SHA1

    119b9985573bbc5ee98e454ba250bfc7e559c06d

  • SHA256

    e1a9999e84e103771d0616d102f4d3e87c4228a081a0d93c0d59dba8b9a5678d

  • SHA512

    3bc8ba17af9e5aafe3791c7280e5680080771140a13fc93685961dfb4b549c10964f6f39efbe50df48e2ca116c969d0e5896f85954175cab823b22a04006f412

  • SSDEEP

    768:vL/4N2iaRjqlzuoFHP3zU9QNlbhTZlyzPoib6vZRWfkK7DeWq3:vpJlqt9FvQQtqzB6vDWMRWq3

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

89.197.154.116:7810

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f230475fc30f6b8ab711a8582802c52d.exe
    "C:\Users\Admin\AppData\Local\Temp\f230475fc30f6b8ab711a8582802c52d.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2644-0-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2644-1-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2644-2-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB