Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 03:54
Behavioral task
behavioral1
Sample
Trojan.Win32.Meterpreter.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Trojan.Win32.Meterpreter.exe
Resource
win10v2004-20240802-en
General
-
Target
Trojan.Win32.Meterpreter.exe
-
Size
72KB
-
MD5
710cd00fb52948e898364df6301e1980
-
SHA1
b2ab62397d9de2155d1fd4d72c5fff81b2a39f65
-
SHA256
513b79673362af0170e985170805f74cae947291df30e19a4aec0976d582fe41
-
SHA512
08452d4710f8d4aa62a666b37b6669a0b8ba8549f517ef7c06184696ebc7f309b9ce13683c74a3c04fe53d688c206f31acbbc50f027436c719aca3ce271030d7
-
SSDEEP
1536:ILTYdVOXov5KtNuEzzy45xD3uqBGMb+KR0Nc8QsJq39:u4v4i+Ge0Nc8QsC9
Malware Config
Extracted
metasploit
windows/exec
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.Win32.Meterpreter.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2548 2532 Trojan.Win32.Meterpreter.exe 30 PID 2532 wrote to memory of 2548 2532 Trojan.Win32.Meterpreter.exe 30 PID 2532 wrote to memory of 2548 2532 Trojan.Win32.Meterpreter.exe 30 PID 2532 wrote to memory of 2548 2532 Trojan.Win32.Meterpreter.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Meterpreter.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Meterpreter.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\cmd.execmd.exe /C echo 'OS{3a69498630e04be98dad0123a9fc3fdf}'2⤵
- System Location Discovery: System Language Discovery
PID:2548
-