Analysis
-
max time kernel
105s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 02:03
Behavioral task
behavioral1
Sample
928dfc361cbeee45feaceb55864a43a311396c29d8b1da05ec9e8877bfc02d00N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
928dfc361cbeee45feaceb55864a43a311396c29d8b1da05ec9e8877bfc02d00N.exe
Resource
win10v2004-20240802-en
General
-
Target
928dfc361cbeee45feaceb55864a43a311396c29d8b1da05ec9e8877bfc02d00N.exe
-
Size
72KB
-
MD5
2505e25c047a416680d71b7384e45fa0
-
SHA1
1750451d92dc1bedf439a9962e3d669bf356f0f5
-
SHA256
928dfc361cbeee45feaceb55864a43a311396c29d8b1da05ec9e8877bfc02d00
-
SHA512
dc7b52e6c5c5a827223129123b105c6dd4af207b65566d8f2f101d3c73037906a1209870324f6b0b6185b94641890dbe0b267ae2790679cb379af7171308347c
-
SSDEEP
1536:I0M8x3wVck++L60Q5RF7rCwxvgwa7gdPMb+KR0Nc8QsJq39:d9VrX0ArCwB3iwe0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 928dfc361cbeee45feaceb55864a43a311396c29d8b1da05ec9e8877bfc02d00N.exe