Analysis

  • max time kernel
    105s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2024, 03:10

General

  • Target

    b5d69a2fe04f624a7c1469b0cfc1833d9fae77e6f6fb4c3b9c95f16c0d789c6dN.exe

  • Size

    72KB

  • MD5

    493c810d0c29ae471eca69dd53667380

  • SHA1

    e3fdfea637d1905c53e24f849df372818f502bae

  • SHA256

    b5d69a2fe04f624a7c1469b0cfc1833d9fae77e6f6fb4c3b9c95f16c0d789c6d

  • SHA512

    e2e2148ff5d265ff744398e62a9a9b9ffe6de2fc62d707523470cb686b380a158dd49b1005c7f6ed910fe81dfe390c1d7944af22ba648d9e8b3a240038e1dbd0

  • SSDEEP

    768:IeyLqc0nL47KE3vJsBVddCYZ2+qzFjXfVemRi9Ldkm5n8MkJ0PCHSckzCScx4qXx:Irs2fJs3hQxjaRyN0Mb+KR0Nc8QsJq39

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.213.251:4444

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5d69a2fe04f624a7c1469b0cfc1833d9fae77e6f6fb4c3b9c95f16c0d789c6dN.exe
    "C:\Users\Admin\AppData\Local\Temp\b5d69a2fe04f624a7c1469b0cfc1833d9fae77e6f6fb4c3b9c95f16c0d789c6dN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:5072

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/5072-0-0x0000000000560000-0x0000000000561000-memory.dmp

          Filesize

          4KB