Analysis

  • max time kernel
    105s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-09-2024 22:37

General

  • Target

    3626dda00cd366cf8e4b8dfd21b2c3f43d31694b43acacd49b2f6f077bda847aN.exe

  • Size

    72KB

  • MD5

    158d8c1fc0a750e751c1d73c79cec350

  • SHA1

    d85dc73721e6e5102a3a57f286c18f0b82522076

  • SHA256

    3626dda00cd366cf8e4b8dfd21b2c3f43d31694b43acacd49b2f6f077bda847a

  • SHA512

    91cfce9c6ea8391203468f480f6e2837f9850cf633f8ea7e378440e1929d717ddd8050aaa1630fdd0a9296cbae65106d6e203a508abf674f3cb864f30878a776

  • SSDEEP

    1536:IcfbPuc76vokuF0B2OmBj1dOW7Ef9qfaVMb+KR0Nc8QsJq39:/fbmMgIoTc1wW7Eof8e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/fnstenv_mov

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3626dda00cd366cf8e4b8dfd21b2c3f43d31694b43acacd49b2f6f077bda847aN.exe
    "C:\Users\Admin\AppData\Local\Temp\3626dda00cd366cf8e4b8dfd21b2c3f43d31694b43acacd49b2f6f077bda847aN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2232-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB