Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 01:33
Behavioral task
behavioral1
Sample
bb6c3e7f98d3b40cb754d80c1de0c7d630c7dafb49c5582740d40cf928ee094b.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bb6c3e7f98d3b40cb754d80c1de0c7d630c7dafb49c5582740d40cf928ee094b.exe
Resource
win10v2004-20240802-en
General
-
Target
bb6c3e7f98d3b40cb754d80c1de0c7d630c7dafb49c5582740d40cf928ee094b.exe
-
Size
136KB
-
MD5
422bd6b228bc054bd1c22de49f706a0f
-
SHA1
4efd522c32541f1e9c60c0183424f28276d5fc02
-
SHA256
bb6c3e7f98d3b40cb754d80c1de0c7d630c7dafb49c5582740d40cf928ee094b
-
SHA512
592e5a0a5d18e7c612355f9fac2e9a0a51b46a267620903ab201139ad9664927404c3adff51f3b99c8ff31983e391dba4293cb7ecbf5afd22055ae37b8918f45
-
SSDEEP
3072:jV2cN0fKTM//iB/buAsKFNmhMn7Ihjj/IDRM:jVvN0fKyOaCQf
Malware Config
Extracted
metasploit
metasploit_stager
219.150.121.100:4449
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
resource yara_rule behavioral2/memory/4048-0-0x00007FF707990000-0x00007FF7079D7000-memory.dmp upx behavioral2/memory/4048-2-0x00007FF707990000-0x00007FF7079D7000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4048 bb6c3e7f98d3b40cb754d80c1de0c7d630c7dafb49c5582740d40cf928ee094b.exe 4048 bb6c3e7f98d3b40cb754d80c1de0c7d630c7dafb49c5582740d40cf928ee094b.exe