Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 03:54
Behavioral task
behavioral1
Sample
Trojan.Win32.Meterpreter.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Trojan.Win32.Meterpreter.exe
Resource
win10v2004-20240802-en
General
-
Target
Trojan.Win32.Meterpreter.exe
-
Size
72KB
-
MD5
710cd00fb52948e898364df6301e1980
-
SHA1
b2ab62397d9de2155d1fd4d72c5fff81b2a39f65
-
SHA256
513b79673362af0170e985170805f74cae947291df30e19a4aec0976d582fe41
-
SHA512
08452d4710f8d4aa62a666b37b6669a0b8ba8549f517ef7c06184696ebc7f309b9ce13683c74a3c04fe53d688c206f31acbbc50f027436c719aca3ce271030d7
-
SSDEEP
1536:ILTYdVOXov5KtNuEzzy45xD3uqBGMb+KR0Nc8QsJq39:u4v4i+Ge0Nc8QsC9
Malware Config
Extracted
metasploit
windows/exec
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.Win32.Meterpreter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3160 wrote to memory of 4488 3160 Trojan.Win32.Meterpreter.exe 82 PID 3160 wrote to memory of 4488 3160 Trojan.Win32.Meterpreter.exe 82 PID 3160 wrote to memory of 4488 3160 Trojan.Win32.Meterpreter.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Meterpreter.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Meterpreter.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\cmd.execmd.exe /C echo 'OS{3a69498630e04be98dad0123a9fc3fdf}'2⤵
- System Location Discovery: System Language Discovery
PID:4488
-