Analysis
-
max time kernel
74s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 01:50
Behavioral task
behavioral1
Sample
587467c0952aa67773557f861183dd022ff141c1e1556882d5f28296f4852a45N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
587467c0952aa67773557f861183dd022ff141c1e1556882d5f28296f4852a45N.exe
Resource
win10v2004-20240802-en
General
-
Target
587467c0952aa67773557f861183dd022ff141c1e1556882d5f28296f4852a45N.exe
-
Size
72KB
-
MD5
ead132f490f893ff1590765765916580
-
SHA1
c3a5097245375c522401aa2be5a838a818878de9
-
SHA256
587467c0952aa67773557f861183dd022ff141c1e1556882d5f28296f4852a45
-
SHA512
ad34701b69145060fb21422d3e7536ae97141fa9d8ad2d758dee7a41d75c245fe3a517888d5f41823b150536cd72335a1a75380d55ebbd9c908a9d4b4d90b286
-
SSDEEP
1536:IamSMta4A6PO9BArNSkpp0DuMD890Uqfn/dHEAHMb+KR0Nc8QsJq39:T96xUkp0DFDS4n/u+e0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 587467c0952aa67773557f861183dd022ff141c1e1556882d5f28296f4852a45N.exe