Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 01:41
Behavioral task
behavioral1
Sample
malware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
malware.exe
Resource
win10v2004-20240802-en
General
-
Target
malware.exe
-
Size
72KB
-
MD5
c57d2d28401b5ffb9a922165ccb26924
-
SHA1
0a8c1714562218f631218dbbc5e2d6aabbfd7e60
-
SHA256
99156292165787d82eb16a33800dfaa5ebb830c377a300050e79df180da59916
-
SHA512
91500af5a97812be6e09e3dfd4e11dee700a63f807fc3cce5ba4c26d837dfb6fcb0efc1fb1479895649a6278e5d928cedfa8d12791dfcc8a492c2c5d7950cef3
-
SSDEEP
1536:ILTYdVOXom5KtNuEzzy45xD3uqBGMb+KR0Nc8QsJq39:u4m4i+Ge0Nc8QsC9
Malware Config
Extracted
metasploit
windows/exec
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language malware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2924 2720 malware.exe 29 PID 2720 wrote to memory of 2924 2720 malware.exe 29 PID 2720 wrote to memory of 2924 2720 malware.exe 29 PID 2720 wrote to memory of 2924 2720 malware.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\malware.exe"C:\Users\Admin\AppData\Local\Temp\malware.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd.exe /C echo 'OS{0115731dbb79241d3cb4e317fa4e18d4}'2⤵
- System Location Discovery: System Language Discovery
PID:2924
-