Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 01:59

General

  • Target

    0590b6a6c18af43298822b7a80674d9a72bc1c0255d31794c61f825fa2fcada3N.exe

  • Size

    212KB

  • MD5

    8dfd953ca7aed735b49332a110935570

  • SHA1

    dfcc9b94125d32faa5db1fcf339a2183176a1b56

  • SHA256

    0590b6a6c18af43298822b7a80674d9a72bc1c0255d31794c61f825fa2fcada3

  • SHA512

    654a21058eb2839555cdc6302a3d76474302c738f12e5c02a7b5b325fd9e88f0e697b3d78a4a7f8daba02fd62534ac3205a62bdbdb9efe0e42519de641e89c12

  • SSDEEP

    3072:BVLOYEUXPnf/jYLHDUFPHvf/0A4o4M7Acoh+/Sr:pEUXvsLHQFfvXRQf+/w

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.0.48:3287

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0590b6a6c18af43298822b7a80674d9a72bc1c0255d31794c61f825fa2fcada3N.exe
    "C:\Users\Admin\AppData\Local\Temp\0590b6a6c18af43298822b7a80674d9a72bc1c0255d31794c61f825fa2fcada3N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1852-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB