Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 12:39
Behavioral task
behavioral1
Sample
ef3057c2b1e9b1e11c093a6139c402a1f73f8f9ce30c88451ebf1e967d345b29.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef3057c2b1e9b1e11c093a6139c402a1f73f8f9ce30c88451ebf1e967d345b29.exe
Resource
win10v2004-20240802-en
General
-
Target
ef3057c2b1e9b1e11c093a6139c402a1f73f8f9ce30c88451ebf1e967d345b29.exe
-
Size
97KB
-
MD5
800d44b25f8352240fe26c9146e0e48e
-
SHA1
e3ff6a9e1747fa972a5dbfd1cc4fa0f1df8d60c8
-
SHA256
ef3057c2b1e9b1e11c093a6139c402a1f73f8f9ce30c88451ebf1e967d345b29
-
SHA512
1ddc136aca0e3e4a39bcf8b46c895b63c7e19c7b5ebeb405c5a70a8f0ef231eeac0913e0707f5f0bde97984de67dcb24e6d74e15d7336bb8d63303f7744ac873
-
SSDEEP
1536:Rwo5YqtFiuQIid5OCbTIxPPvMtUBpyBPcsV6GcLXzth6g:RwLGh6g
Malware Config
Extracted
metasploit
windows/reverse_tcp
172.16.230.204:2422
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1432 2572 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef3057c2b1e9b1e11c093a6139c402a1f73f8f9ce30c88451ebf1e967d345b29.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef3057c2b1e9b1e11c093a6139c402a1f73f8f9ce30c88451ebf1e967d345b29.exe"C:\Users\Admin\AppData\Local\Temp\ef3057c2b1e9b1e11c093a6139c402a1f73f8f9ce30c88451ebf1e967d345b29.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 2442⤵
- Program crash
PID:1432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2572 -ip 25721⤵PID:1540