Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 16:40
Behavioral task
behavioral1
Sample
d81a97dbfd5570a1345c7b510261eed0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d81a97dbfd5570a1345c7b510261eed0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d81a97dbfd5570a1345c7b510261eed0N.exe
-
Size
72KB
-
MD5
d81a97dbfd5570a1345c7b510261eed0
-
SHA1
5ad0e5fa77acf68f332b06cda6bfdfb0780815b1
-
SHA256
65416e5b0925a49169784a3255d7fbbfe999057366a55800c951635335dfd30e
-
SHA512
40277c22bbc2d0bb84dffb7f30002af809613243a0b57fd07d51e8135bc49a8228215fb757b0f72d08c122c40ef1c3d415242a3a6e6901b0da0ebe35ba189091
-
SSDEEP
1536:ILTYdVOXoU5KtNuEzzy45xD3uqBGMb+KR0Nc8QsJq39:u4U4i+Ge0Nc8QsC9
Malware Config
Extracted
metasploit
windows/exec
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d81a97dbfd5570a1345c7b510261eed0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2360 3024 d81a97dbfd5570a1345c7b510261eed0N.exe 31 PID 3024 wrote to memory of 2360 3024 d81a97dbfd5570a1345c7b510261eed0N.exe 31 PID 3024 wrote to memory of 2360 3024 d81a97dbfd5570a1345c7b510261eed0N.exe 31 PID 3024 wrote to memory of 2360 3024 d81a97dbfd5570a1345c7b510261eed0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d81a97dbfd5570a1345c7b510261eed0N.exe"C:\Users\Admin\AppData\Local\Temp\d81a97dbfd5570a1345c7b510261eed0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.execmd.exe /C echo 'OS{29647dbe0dfa8f57368ab95c91863415}'2⤵
- System Location Discovery: System Language Discovery
PID:2360
-