Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 20:37
Behavioral task
behavioral1
Sample
419490f8184e425c9d2c47aabc49f838635450658d02e153daaaa035f963989e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
419490f8184e425c9d2c47aabc49f838635450658d02e153daaaa035f963989e.exe
Resource
win10v2004-20240802-en
General
-
Target
419490f8184e425c9d2c47aabc49f838635450658d02e153daaaa035f963989e.exe
-
Size
72KB
-
MD5
c6b7f6fef7a07a467e2fd5e6541782ce
-
SHA1
319c1b77df40ac43d377170a6b9e13805d54916e
-
SHA256
419490f8184e425c9d2c47aabc49f838635450658d02e153daaaa035f963989e
-
SHA512
e52c4503c7cedc252a47cbe9d0629d4b31a6e22783e4d25623bfb2633abe8186de966fab905a5b4083d87eaa795a809706a5f5148c67ffd9a3762a6ab8702914
-
SSDEEP
1536:IJX24rWVq1Xxr0E44Kd8nEPbdIqDl4z8HuW3Mb+KR0Nc8QsJq39:q22WVq1Xxr0h4KOMIqhfuW3e0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
10.11.33.196:443
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 419490f8184e425c9d2c47aabc49f838635450658d02e153daaaa035f963989e.exe