Analysis

  • max time kernel
    105s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/01/2025, 23:53

General

  • Target

    41a60a2247466ed5159ab6e4922075d9c5d36195fc63a8a685be99452943b1d3N.exe

  • Size

    139KB

  • MD5

    958715a3c62ee9ba7f7956d013c03eb0

  • SHA1

    d5a08230e125f299df6e6a308b91f9a115f4093f

  • SHA256

    41a60a2247466ed5159ab6e4922075d9c5d36195fc63a8a685be99452943b1d3

  • SHA512

    c4a598fdfb7af87784314a935aefcf6d73b28ef3e53db1ea4e508aafa40f3f41a6dbcb958759067810cdbe420108c4f87c4946078b3f1b76a6e95224563d0d27

  • SSDEEP

    3072:yXEqQVkIyXgFSynAFw8JFBVKOMwwJ8zEOnG/P:yXRQGIJ+Fw8JFzcLOnG/

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

192.168.1.20:123

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family

Processes

  • C:\Users\Admin\AppData\Local\Temp\41a60a2247466ed5159ab6e4922075d9c5d36195fc63a8a685be99452943b1d3N.exe
    "C:\Users\Admin\AppData\Local\Temp\41a60a2247466ed5159ab6e4922075d9c5d36195fc63a8a685be99452943b1d3N.exe"
    1⤵
      PID:2220

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2220-0-0x0000022232DB0000-0x0000022232DB1000-memory.dmp

      Filesize

      4KB