Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 01:37
Behavioral task
behavioral1
Sample
cf80605f4611fe7d71a6f3e0bd4014e8fbb412f64bbcf50cdf7456a61ad3babc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf80605f4611fe7d71a6f3e0bd4014e8fbb412f64bbcf50cdf7456a61ad3babc.exe
Resource
win10v2004-20240802-en
General
-
Target
cf80605f4611fe7d71a6f3e0bd4014e8fbb412f64bbcf50cdf7456a61ad3babc.exe
-
Size
72KB
-
MD5
2bf2123730614e66c7a5b926a7eea340
-
SHA1
1d5f0e337900fa734744449e8ca84352c95ae0fc
-
SHA256
cf80605f4611fe7d71a6f3e0bd4014e8fbb412f64bbcf50cdf7456a61ad3babc
-
SHA512
7e0d0ba1464e7952de1c635910b2ef7de12f6c66f2cd4b18e721610c222bd9b1d439667e8e49b561c872790395e5dce13e28eee089ef80a12bdb3b8a3a983607
-
SSDEEP
1536:IPB1LM/Ylru/TVK28soM1lCqLPZpuNMb+KR0Nc8QsJq39:oQK2f1lnLPZp0e0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
89.197.154.116:7810
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf80605f4611fe7d71a6f3e0bd4014e8fbb412f64bbcf50cdf7456a61ad3babc.exe