Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
ccf3af35adbe67a458d5de83c50aac89b24dabafdee39dc47fdb1a5a85995083.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ccf3af35adbe67a458d5de83c50aac89b24dabafdee39dc47fdb1a5a85995083.exe
Resource
win10v2004-20240802-en
General
-
Target
ccf3af35adbe67a458d5de83c50aac89b24dabafdee39dc47fdb1a5a85995083.exe
-
Size
14KB
-
MD5
4c0466a4add441228e21b76ec79d22d0
-
SHA1
7cad44491e42676def31ae6a4f7b1940a0bdd09f
-
SHA256
ccf3af35adbe67a458d5de83c50aac89b24dabafdee39dc47fdb1a5a85995083
-
SHA512
720b8b528030ec3aff64469a669ce7d72805376128f17dea1c8e358e8b381b23defa73a8db4221bf5d3622117c74e92bde16733d3757d4f754c3db569bb970f2
-
SSDEEP
192:K3mbPYCfMcrfOIuZmvKQxtzlSIVX6NONEkuVhGspejDMN1:hMCfrfQ6tBSIUkcQspeUN1
Malware Config
Extracted
metasploit
windows/download_exec
http://192.168.180.12:7810/BKje
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccf3af35adbe67a458d5de83c50aac89b24dabafdee39dc47fdb1a5a85995083.exe