Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 15:33
Behavioral task
behavioral1
Sample
2c8f857962404f54565d8a1e89169031b0b8680608421da4232a5483c6375e6aN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2c8f857962404f54565d8a1e89169031b0b8680608421da4232a5483c6375e6aN.exe
Resource
win10v2004-20240802-en
General
-
Target
2c8f857962404f54565d8a1e89169031b0b8680608421da4232a5483c6375e6aN.exe
-
Size
72KB
-
MD5
5c3e56763d9f12d8ddd19df4594453c0
-
SHA1
1680d0c97ba90110833b29bdba1a61fe9c98bc0e
-
SHA256
2c8f857962404f54565d8a1e89169031b0b8680608421da4232a5483c6375e6a
-
SHA512
64bc95b7c9de971507bce87aa9e17818b4a0f27e015cd54957a6ef525285e14cf6ac5b5b74c4c5632ffb22526cda4968cec9fd717ca657459eb22d51123f53c9
-
SSDEEP
1536:I/PFjnbAp24ctzl83myJDXT4a2TYwTCp2RB/Mb+KR0Nc8QsJq39:YPFjbApgtzl83tXT4ywTa2RFe0Nc8Qss
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c8f857962404f54565d8a1e89169031b0b8680608421da4232a5483c6375e6aN.exe