Analysis

  • max time kernel
    14s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    08/11/2024, 18:15

General

  • Target

    ebfb0b0147f80120e2a200ef0fe774a9bab34ed69d46c5743a6b8ad2062b2dedN.exe

  • Size

    7KB

  • MD5

    36ccb0b25dba4d27929cf0650dcf4ba0

  • SHA1

    b0d686c0d3bf71a2c257e85fae964118d587234a

  • SHA256

    ebfb0b0147f80120e2a200ef0fe774a9bab34ed69d46c5743a6b8ad2062b2ded

  • SHA512

    8f570dc234e1d57e4a5b93f101d222633fa04c75b528f38ba8ae8a1e3ccd387eaf7117c18a700e75f05101b068f3339969d88ea8e7c93270ddb1822b44bd28a5

  • SSDEEP

    24:eFGStrJ9u0/63AinZdkBQAVP1k+gwKZqDeNDMSCvOXpmB:is0wA6kBQI++J9SD9C2kB

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

0.0.37.55:4444

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebfb0b0147f80120e2a200ef0fe774a9bab34ed69d46c5743a6b8ad2062b2dedN.exe
    "C:\Users\Admin\AppData\Local\Temp\ebfb0b0147f80120e2a200ef0fe774a9bab34ed69d46c5743a6b8ad2062b2dedN.exe"
    1⤵
      PID:2200

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2200-1-0x0000000140000000-0x0000000140004278-memory.dmp

      Filesize

      16KB

    • memory/2200-0-0x0000000140000000-0x0000000140004278-memory.dmp

      Filesize

      16KB