Analysis
-
max time kernel
99s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2025, 06:57
Behavioral task
behavioral1
Sample
2025-04-15_8353c242c9e3da76692139f477677e49_black-basta_elex.exe
Resource
win10v2004-20250410-en
3 signatures
150 seconds
General
-
Target
2025-04-15_8353c242c9e3da76692139f477677e49_black-basta_elex.exe
-
Size
10.2MB
-
MD5
8353c242c9e3da76692139f477677e49
-
SHA1
bc25d0c9f8073b5e28a1b4a5b7590c6ab0ea8be5
-
SHA256
2cccac6a3c5051ef101898606d7421d8032f04930fb15aefd940bdbb094ecb13
-
SHA512
070d54349b64ed4102624648f9a043a9fb9fd6d11091804322137df9b47a95867b53713418d3396c716eda77480cf75304db7c689bea1b3906dce59c6db8368b
-
SSDEEP
196608:XQ+bPXVzF+Zby8xkdFNWfylGdbjB3IqaenV:XX/VzeblCdefPdHlTV
Score
10/10
Malware Config
Extracted
Family
metasploit
Version
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Program crash 3 IoCs
pid pid_target Process procid_target 5600 2376 WerFault.exe 84 4724 2376 WerFault.exe 84 4672 2376 WerFault.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-15_8353c242c9e3da76692139f477677e49_black-basta_elex.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-15_8353c242c9e3da76692139f477677e49_black-basta_elex.exe"1⤵PID:2376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 5482⤵
- Program crash
PID:5600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 1362⤵
- Program crash
PID:4724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 2362⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2376 -ip 23761⤵PID:5428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2376 -ip 23761⤵PID:4456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2376 -ip 23761⤵PID:4520