Analysis

  • max time kernel
    92s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2024, 17:05

General

  • Target

    d3924df7496deae0c2afc053045e892f3008619a2d9e3608671ec6314df35be8.exe

  • Size

    258KB

  • MD5

    e0534feb7f3955c85d04023941f8bd1f

  • SHA1

    de93da27d7d79ddca16cb031a59bbf49e278d71f

  • SHA256

    d3924df7496deae0c2afc053045e892f3008619a2d9e3608671ec6314df35be8

  • SHA512

    27e25b9f41b112ac030a7b23a8515d598a07b671f2c306049ee440f71f424e6f6137b1713c6e76416215af3bde3654cec15a7b425b5aa03c2a275db0e940ddf6

  • SSDEEP

    6144:uZv0TIJu+3GXNHTM9gaxRTKp9dm2ua7jZiX+pJLh6:u2Tf+2dzMe2Kua7MX+r6

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://192.168.239.129:17822/RnXD

Attributes
  • headers User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0; MASAJS)

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3924df7496deae0c2afc053045e892f3008619a2d9e3608671ec6314df35be8.exe
    "C:\Users\Admin\AppData\Local\Temp\d3924df7496deae0c2afc053045e892f3008619a2d9e3608671ec6314df35be8.exe"
    1⤵
      PID:4504

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4504-0-0x000002691F240000-0x000002691F241000-memory.dmp

      Filesize

      4KB

    • memory/4504-1-0x00007FF6E54A0000-0x00007FF6E54E9000-memory.dmp

      Filesize

      292KB