Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-11-2024 04:35

General

  • Target

    c7f511782f18a36fbe98a4bb6b8547e10ab9e31fd734fd3b2635c7f00a7bdd7c.exe

  • Size

    66KB

  • MD5

    3b9582c7ca49bfc5fd8e311030838136

  • SHA1

    29e84e74501daa89d8c148488234b3feb80a8b72

  • SHA256

    c7f511782f18a36fbe98a4bb6b8547e10ab9e31fd734fd3b2635c7f00a7bdd7c

  • SHA512

    b6e78373aac933305e307f10fa04f37f65ef8dfe55e3afea4fb10133a4d340d1a62284b2a33e2755e2046db243c2c964fcb49738aa364244fafa79c6add56e9c

  • SSDEEP

    384:HfkKb0h2aCqr+x48mZvweTE4yWyVFct4I8JiCiWGW6wtiS4QfBH97zYmBWAp9Xip:HszhFC++z4ynqF+G/SpBd7zY3Ap9g

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7f511782f18a36fbe98a4bb6b8547e10ab9e31fd734fd3b2635c7f00a7bdd7c.exe
    "C:\Users\Admin\AppData\Local\Temp\c7f511782f18a36fbe98a4bb6b8547e10ab9e31fd734fd3b2635c7f00a7bdd7c.exe"
    1⤵
      PID:3000

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3000-0-0x000000013F040000-0x000000013F067000-memory.dmp

      Filesize

      156KB