Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 06:32
Static task
static1
Behavioral task
behavioral1
Sample
c98ca1714a3cf5d09cb416f33353a613f20af63a33ba7f1443833911b28edd17.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c98ca1714a3cf5d09cb416f33353a613f20af63a33ba7f1443833911b28edd17.exe
Resource
win10v2004-20240508-en
General
-
Target
c98ca1714a3cf5d09cb416f33353a613f20af63a33ba7f1443833911b28edd17.exe
-
Size
1.9MB
-
MD5
4b2d13afeb239a3e8bcb55cacfa64da8
-
SHA1
d5db98435a253e1108980790927b2a6b9b4186f4
-
SHA256
c98ca1714a3cf5d09cb416f33353a613f20af63a33ba7f1443833911b28edd17
-
SHA512
8dfef526c04f88bad2fec432ae40e86248ba91274d1c70ca9b6185136a0bc6aa70e7a906c0d72e293896fcf8dbd2045d557f70144a5eafad9dd30ab5852ca96c
-
SSDEEP
24576:RdHvIu9b+5onESNY36mQZRvhMk+Joe3PUF8K0JcM9zbK5ZGZFqKyvI33GrQVEhsL:gKyz2MEQV2iLo6nvX4YersbACRdTg
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.204.138:1234
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
c98ca1714a3cf5d09cb416f33353a613f20af63a33ba7f1443833911b28edd17.exepid process 2208 c98ca1714a3cf5d09cb416f33353a613f20af63a33ba7f1443833911b28edd17.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2208-0-0x0000000000400000-0x0000000000602000-memory.dmpFilesize
2.0MB
-
memory/2208-1-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/2208-2-0x0000000000400000-0x0000000000602000-memory.dmpFilesize
2.0MB
-
memory/2208-11-0x0000000000400000-0x0000000000602000-memory.dmpFilesize
2.0MB
-
memory/2208-12-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB