Overview
overview
10Static
static
3fdb315d13b...8d.exe
windows7-x64
10fdb315d13b...8d.exe
windows10-2004-x64
10$PLUGINSDI...ib.dll
windows7-x64
3$PLUGINSDI...ib.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
4$PLUGINSDI...er.dll
windows10-2004-x64
4bin/DuiLib.dll
windows7-x64
3bin/DuiLib.dll
windows10-2004-x64
3Analysis
-
max time kernel
130s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 18:45
Static task
static1
Behavioral task
behavioral1
Sample
fdb315d13bc1d34e48ee12544f71f913ac0e19a32ee01da633de03e0a5fb708d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdb315d13bc1d34e48ee12544f71f913ac0e19a32ee01da633de03e0a5fb708d.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DuiLib.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DuiLib.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/installer-helper.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/installer-helper.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
bin/DuiLib.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
bin/DuiLib.dll
Resource
win10v2004-20240802-en
General
-
Target
fdb315d13bc1d34e48ee12544f71f913ac0e19a32ee01da633de03e0a5fb708d.exe
-
Size
22.2MB
-
MD5
2a60eeaa91405bf8250b7856273cf7ac
-
SHA1
fc94dd36d30f943c901d0d137410d6df3748581e
-
SHA256
fdb315d13bc1d34e48ee12544f71f913ac0e19a32ee01da633de03e0a5fb708d
-
SHA512
7f4a864b1e60693dd08e36796bc65ccb82db79999c372b76df0b33fed872d2515c2713712b000a81fb8c9433cfb69415756bb8e0083e06512ae7da684ea09e0f
-
SSDEEP
393216:NgkIH2dXqS8BntKQUJLfKag14WqA9zQk0q6+1AGJKUPofKD6nbP9:N7IH2daS8BnnU5CbjdzSXGJdgf7b1
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
149.28.128.13:10000
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdb315d13bc1d34e48ee12544f71f913ac0e19a32ee01da633de03e0a5fb708d.exe