Analysis
-
max time kernel
106s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 04:44
Static task
static1
Behavioral task
behavioral1
Sample
e0fc7b95951904456a15a393d7862aa98e91cb5d847a74a408c6c1d1d8aa7775N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0fc7b95951904456a15a393d7862aa98e91cb5d847a74a408c6c1d1d8aa7775N.exe
Resource
win10v2004-20240802-en
General
-
Target
e0fc7b95951904456a15a393d7862aa98e91cb5d847a74a408c6c1d1d8aa7775N.exe
-
Size
72KB
-
MD5
06af56ea18029b678436ad33e45d9f30
-
SHA1
04436734cdca9dc12986b04b5d2a8483c46b029a
-
SHA256
e0fc7b95951904456a15a393d7862aa98e91cb5d847a74a408c6c1d1d8aa7775
-
SHA512
7aa091346db82b005325046e5ada03b1067eec38d404970d13168380272ff7fd3506e22c44fae4e95c23d905d721aad19c70d2f7245619cc75e444e53a227d67
-
SSDEEP
1536:I74qyZnmiyG59JYRm7uLUvMGPaFoeMb+KR0Nc8QsJq39:1qQm4JYR1LCjke0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0fc7b95951904456a15a393d7862aa98e91cb5d847a74a408c6c1d1d8aa7775N.exe