Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 02:11
Behavioral task
behavioral1
Sample
Trojan.Win32.Meterpreter.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Trojan.Win32.Meterpreter.exe
Resource
win10v2004-20240802-en
General
-
Target
Trojan.Win32.Meterpreter.exe
-
Size
72KB
-
MD5
f6707cae075d7e0c9b64b76e8e71ef80
-
SHA1
79f2434c3d478e6d4dc8fd6156f9a68ea3c4c13a
-
SHA256
c1c0c83ca75473f34b9588b6254550588fcfa70cbe86e1e5d56efbaf9c7797aa
-
SHA512
09fcf853d6d0195676043a6423d152481b9de8f30b3962fad28e9645ea5717512b4f7867427710a40a5d202ee155764bad985299215ad26e791a4589d3200112
-
SSDEEP
1536:ILTYdVOXo95KtNuEzzy45xD3uqBGMb+KR0Nc8QsJq39:u494i+Ge0Nc8QsC9
Malware Config
Extracted
metasploit
windows/exec
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.Win32.Meterpreter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4172 wrote to memory of 1040 4172 Trojan.Win32.Meterpreter.exe 82 PID 4172 wrote to memory of 1040 4172 Trojan.Win32.Meterpreter.exe 82 PID 4172 wrote to memory of 1040 4172 Trojan.Win32.Meterpreter.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Meterpreter.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Meterpreter.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\cmd.execmd.exe /C echo 'OS{612767a47995e3d913f5a13c9f39735e}'2⤵
- System Location Discovery: System Language Discovery
PID:1040
-