Analysis

  • max time kernel
    105s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 09:53

General

  • Target

    f44520492d96141944d0cb8d6a6e02b48f47324c5d55cd8c9a25cea6e8359121N.exe

  • Size

    7KB

  • MD5

    b4a2ac7d5d313d4ae85ed86276fa2d20

  • SHA1

    5906d9148260fb38a35d133b4e63b15254a5fdfe

  • SHA256

    f44520492d96141944d0cb8d6a6e02b48f47324c5d55cd8c9a25cea6e8359121

  • SHA512

    40be0e163572078b9647b62101be6d2bcf2f700ea9ea60cb03e4da10b7adac53f9c8c6dd030f5dad697813e8cabaa9af49abc549a751b5ca6828fae4b8d8a1ef

  • SSDEEP

    24:eFGStrJ9u0/6h/nZdkBQAV2okNwKLqy/eNDMSCvOXpmB:is08bkBQ7uS/SD9C2kB

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

192.168.233.128:9998

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family

Processes

  • C:\Users\Admin\AppData\Local\Temp\f44520492d96141944d0cb8d6a6e02b48f47324c5d55cd8c9a25cea6e8359121N.exe
    "C:\Users\Admin\AppData\Local\Temp\f44520492d96141944d0cb8d6a6e02b48f47324c5d55cd8c9a25cea6e8359121N.exe"
    1⤵
      PID:1128

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1128-0-0x0000000140000000-0x0000000140004278-memory.dmp

      Filesize

      16KB