Analysis
-
max time kernel
96s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 14:12
Static task
static1
Behavioral task
behavioral1
Sample
b41a988bdf7f9184b63d2d666fec84e1271530f7ad2dd4955474851cd85585a0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b41a988bdf7f9184b63d2d666fec84e1271530f7ad2dd4955474851cd85585a0.exe
Resource
win10v2004-20240802-en
General
-
Target
b41a988bdf7f9184b63d2d666fec84e1271530f7ad2dd4955474851cd85585a0.exe
-
Size
14KB
-
MD5
f71540c394b40c37f51658cd30cba550
-
SHA1
06c2c848fc90eef7010ec11e3d61682ee9399800
-
SHA256
b41a988bdf7f9184b63d2d666fec84e1271530f7ad2dd4955474851cd85585a0
-
SHA512
5704b551abe9cfebaaa1b7c2d1de05173b9efbb8e741bca683dd2bbc2e80d81d8899357a42b8b0cdb595c0c2343672b499c7b9b61d7008fe32b901ff6060c7a3
-
SSDEEP
192:i3mbPYCfMcrfOIuZmvKQxtzlSIVX6NO45ejDMN1:5MCfrfQ6tBSIO5eUN1
Malware Config
Extracted
metasploit
windows/download_exec
http://192.168.77.130:1234/b7Lw
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0; MATBJS)
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b41a988bdf7f9184b63d2d666fec84e1271530f7ad2dd4955474851cd85585a0.exe