Analysis
-
max time kernel
106s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 03:41
Behavioral task
behavioral1
Sample
f2d05ad8bfed7d0f0ffcdcf09eabb8d0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f2d05ad8bfed7d0f0ffcdcf09eabb8d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f2d05ad8bfed7d0f0ffcdcf09eabb8d0N.exe
-
Size
72KB
-
MD5
f2d05ad8bfed7d0f0ffcdcf09eabb8d0
-
SHA1
266e6d61f63ea0b02f1f18d2e69dbdcc1658b5fa
-
SHA256
def88a00d632d4407edb35b37c63aaeef4a5498f6bdddf7fd6653ca0a2b5d72d
-
SHA512
cd9b77109ed13ac2a56fe60b460bacb154fe5605c9602c394d1cf3f454cd2965a04b8aa22a7bf2725206f0c56ec343c85e6394e8aa527053c721427ea7a3ff05
-
SSDEEP
1536:IfMf7iE48bBPsuHP1nNLnMb+KR0Nc8QsJq39:dfRfbBEuHPpVe0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2d05ad8bfed7d0f0ffcdcf09eabb8d0N.exe