Analysis
-
max time kernel
105s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 02:48
Behavioral task
behavioral1
Sample
db670953f297568acff96aab8e0c7a3344e006acfdb5dd1acdf080b66185840bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db670953f297568acff96aab8e0c7a3344e006acfdb5dd1acdf080b66185840bN.exe
Resource
win10v2004-20240802-en
General
-
Target
db670953f297568acff96aab8e0c7a3344e006acfdb5dd1acdf080b66185840bN.exe
-
Size
72KB
-
MD5
c633b27930428d0c74939d9715391690
-
SHA1
442a21cac6cc6fd5a3cd9b3c3fe2fe4d8ce3bb43
-
SHA256
db670953f297568acff96aab8e0c7a3344e006acfdb5dd1acdf080b66185840b
-
SHA512
b3e9f1b03fc21279ccbd54690850b2c1f1193dc3b2bcc0b19240ee90d7e9cad4b8b6585414027ffb7f45dff15db040b9d0fb010ee043a5b331c7bb3c4166675b
-
SSDEEP
1536:IsBR0wfWOF8U1UDCi64ShZXjafbMb+KR0Nc8QsJq39:bBR0YWOWU1Hi6xHaDe0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db670953f297568acff96aab8e0c7a3344e006acfdb5dd1acdf080b66185840bN.exe