Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 18:37
Behavioral task
behavioral1
Sample
cc5b36114d8ae6f6f5ac5061c23242e87737038be20be053ac04746cbe5a2067N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cc5b36114d8ae6f6f5ac5061c23242e87737038be20be053ac04746cbe5a2067N.exe
Resource
win10v2004-20240802-en
General
-
Target
cc5b36114d8ae6f6f5ac5061c23242e87737038be20be053ac04746cbe5a2067N.exe
-
Size
72KB
-
MD5
4be3a2287283d6a45bb1dc0c1e9efa80
-
SHA1
5d6cc000b69dbdfe3a2186bd16237ce69504cea4
-
SHA256
cc5b36114d8ae6f6f5ac5061c23242e87737038be20be053ac04746cbe5a2067
-
SHA512
da9479db1ed42a636543b31f52932b92bfbfbcdb867b9ddc058ffd30266d3277c60258253ccccc54a2a69a66634c51f5e7c59b18bcc02aec2da3042382a45649
-
SSDEEP
1536:I5YVfvH8HweUX8ajDuTPKPMXqgsH80Q2nZ61lzzMb+KR0Nc8QsJq39:myf/8HwRjDGPK2sH8oYzne0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc5b36114d8ae6f6f5ac5061c23242e87737038be20be053ac04746cbe5a2067N.exe