Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2024 09:14

General

  • Target

    b06f5d3ffc537f6a1279cec8ce0f35bf4dcbf6e024b20e125cb3632af3dd6f19.exe

  • Size

    273KB

  • MD5

    5f095f61d90068a5bef8864a42d2db93

  • SHA1

    4c3b1aa82d6d816b97a3b9d88c6991c0ef3ed36d

  • SHA256

    b06f5d3ffc537f6a1279cec8ce0f35bf4dcbf6e024b20e125cb3632af3dd6f19

  • SHA512

    4ebc18bcaa2b2dd5d5c11d54630e123f73ed1010a697c8e57521f049570294c721e6b4afa96f72da8d0cb37f700508b4dd635e32fb4192c1581b42931995bb38

  • SSDEEP

    3072:aN/bNf5vySI8nolTz6EfbPw861SsM9t95ZBfqp3q6OB5GAa6TojkpF/R7ObtQvp2:S/Zf5vy6K36EfbPw861r1e5G562kpiD

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://192.168.150.128:8080/Signin

Attributes
  • headers Connection: close Sec-Fetch-Site: same-origin Sec-Fetch-Mode: navigate Sec-Fetch-User: ?1 Sec-Detch-Dest: document User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 12_1_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Mobile/16C104

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b06f5d3ffc537f6a1279cec8ce0f35bf4dcbf6e024b20e125cb3632af3dd6f19.exe
    "C:\Users\Admin\AppData\Local\Temp\b06f5d3ffc537f6a1279cec8ce0f35bf4dcbf6e024b20e125cb3632af3dd6f19.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2268-0-0x0000000000930000-0x0000000000979000-memory.dmp

    Filesize

    292KB

  • memory/2268-1-0x0000000000930000-0x0000000000979000-memory.dmp

    Filesize

    292KB

  • memory/2268-2-0x0000000000930000-0x0000000000979000-memory.dmp

    Filesize

    292KB