Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
6b6e1a7127bc7d24c4cbea5d3103edb52eb32f66d5c746d33a4e926e9741e7d0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6b6e1a7127bc7d24c4cbea5d3103edb52eb32f66d5c746d33a4e926e9741e7d0.exe
Resource
win10v2004-20240802-en
General
-
Target
6b6e1a7127bc7d24c4cbea5d3103edb52eb32f66d5c746d33a4e926e9741e7d0.exe
-
Size
149KB
-
MD5
9e63c6541cec25f68fa93ff840464e0e
-
SHA1
48a0732a624e5718d529b690ad5e38a6e7559dfa
-
SHA256
6b6e1a7127bc7d24c4cbea5d3103edb52eb32f66d5c746d33a4e926e9741e7d0
-
SHA512
f02250153efeb2243b63fa5c779abb353c0c7905e4a9de3d33030fe89f8760c235ef2bcb0e458b499a36dcf132e5da4684fb9eedcdb904c98af8b9a8b0556a3b
-
SSDEEP
3072:7RKcFWBPKTUCi0oz54Ws3RfwAZ82Yi+tS7hXcrDRo:77WBPTrewAZ8hkge
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.72.182:666
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b6e1a7127bc7d24c4cbea5d3103edb52eb32f66d5c746d33a4e926e9741e7d0.exe