Analysis

  • max time kernel
    91s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/12/2024, 20:31

General

  • Target

    d6890b818490b85993ca5d1eb04cb0bb4f2d7164e2f17bc1ef4720a91f9286f1N.exe

  • Size

    2.9MB

  • MD5

    df09b3497f971b23a3cba43c993d96a0

  • SHA1

    65294090484f3b9f3a3a42315224d4164af5f31f

  • SHA256

    d6890b818490b85993ca5d1eb04cb0bb4f2d7164e2f17bc1ef4720a91f9286f1

  • SHA512

    734c4402c144197412558de8465a8c117acbcd45d589e43563abd3a7237e5937af6b5901bd2b3d58ad4e5ace2ca9db2d611f82c79e7f93fba834732fbc9e4f36

  • SSDEEP

    49152:TQqZpGDKw6c8xeIs3jonnUvLVqGT6M9qp4n0qx2UUG2No8BSw7KgI5rG:TpifinwUG+5qx2U787KgYr

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_http

C2

http://192.168.1.12:8443/Jk5MJgbw_dZjImIjBEFeMwFrH6f-fm9hs2zTaMhZ6oC7_mevgOpPkuhrCAiy9T7vPGlyj8T89D8WC9WtyJf137-bRXhhcpj4ZR1-DB4

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6890b818490b85993ca5d1eb04cb0bb4f2d7164e2f17bc1ef4720a91f9286f1N.exe
    "C:\Users\Admin\AppData\Local\Temp\d6890b818490b85993ca5d1eb04cb0bb4f2d7164e2f17bc1ef4720a91f9286f1N.exe"
    1⤵
      PID:3716

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3716-0-0x00007FFA54770000-0x00007FFA54965000-memory.dmp

            Filesize

            2.0MB

          • memory/3716-1-0x0000011C67410000-0x0000011C67411000-memory.dmp

            Filesize

            4KB