Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 22:05
Behavioral task
behavioral1
Sample
94c5292f428645133c99b81087769270N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
94c5292f428645133c99b81087769270N.exe
Resource
win10v2004-20240802-en
General
-
Target
94c5292f428645133c99b81087769270N.exe
-
Size
7KB
-
MD5
94c5292f428645133c99b81087769270
-
SHA1
50bfe5083e6fbfdc0d83c2876cbf53a83334dab9
-
SHA256
49da13eb22115b9af1e1889a98c4eb1747beb09d15bee91fdbaa8116e9111a53
-
SHA512
d9935a220d5ef9f75e6093661a630ae5fc4990889127c8cb1602c11443b7fff8671cb62d6f09bca7d996bde3799e322ff3f86d856a7db261dd46435819d19722
-
SSDEEP
96:40UJp1koYy09MhRpgydLayJ1kXShgKCJZRC+oE9LaaGpfHyzNt:40UQ2RpgYZ1kXMgKUqXExaDpfH0
Malware Config
Extracted
metasploit
windows/exec
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94c5292f428645133c99b81087769270N.exe