Analysis
-
max time kernel
106s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 08:51
Behavioral task
behavioral1
Sample
cb4b8d4e21541405ae3e10fec87160eb1d497f1427277fd95573e056f71da865N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cb4b8d4e21541405ae3e10fec87160eb1d497f1427277fd95573e056f71da865N.exe
Resource
win10v2004-20240802-en
General
-
Target
cb4b8d4e21541405ae3e10fec87160eb1d497f1427277fd95573e056f71da865N.exe
-
Size
72KB
-
MD5
9a63bd7a494c8f8f2507488ea9d47f00
-
SHA1
fb38c2a2d9c8697e63a03297fe7a1ada4b54c85c
-
SHA256
cb4b8d4e21541405ae3e10fec87160eb1d497f1427277fd95573e056f71da865
-
SHA512
35d187f475414186141a2fd801f26e947ba3ad8d94c534ec9a8399e9723a9217c5af35b93ca61d99a1b3a99e0a0ec0f260664400b1464a24cd12fc2f0e69696d
-
SSDEEP
1536:IE0DlGI/leKpF6BnYQahV8W2x4bDWL2Iiv5jbX+WMb+KR0Nc8QsJq39:d059NnF6YrOWHbe2IWPze0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb4b8d4e21541405ae3e10fec87160eb1d497f1427277fd95573e056f71da865N.exe