Analysis

  • max time kernel
    93s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-11-2024 06:54

General

  • Target

    bfe832dd29e58d5688614981f21252bc2860a387a11368ee25037a1f2da617a8.exe

  • Size

    42KB

  • MD5

    5525330f29a4711edc4f8d4734400979

  • SHA1

    1e85f380c826f869264775f6a638ca9533f8770e

  • SHA256

    bfe832dd29e58d5688614981f21252bc2860a387a11368ee25037a1f2da617a8

  • SHA512

    dcd7861dee9a78b077e3b0222f350f843fea992fc7faf944833f452d80a0f061e8bc398331bf23fe72d9c9a72ad13aff0bff3146242c5f0099095c52e121b569

  • SSDEEP

    384:rKPSlHuSvzpFoqV55pdM1upCfGzEyno8YhWi0wPh0gSXKEBuD2pre:rKPSugpFrDPMsTqhWqhFSXBBuDCr

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://106.15.120.243:8879/dAvA

Attributes
  • headers User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfe832dd29e58d5688614981f21252bc2860a387a11368ee25037a1f2da617a8.exe
    "C:\Users\Admin\AppData\Local\Temp\bfe832dd29e58d5688614981f21252bc2860a387a11368ee25037a1f2da617a8.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/432-0-0x0000000000AB0000-0x0000000000AD0000-memory.dmp

    Filesize

    128KB

  • memory/432-1-0x0000000000AB0000-0x0000000000AD0000-memory.dmp

    Filesize

    128KB