Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 16:28
Static task
static1
Behavioral task
behavioral1
Sample
29db1d5e270e80c17f86fa3a5c131488fc6c1f9e5242ef4469ffbe1a4f414f65.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29db1d5e270e80c17f86fa3a5c131488fc6c1f9e5242ef4469ffbe1a4f414f65.exe
Resource
win10v2004-20240802-en
General
-
Target
29db1d5e270e80c17f86fa3a5c131488fc6c1f9e5242ef4469ffbe1a4f414f65.exe
-
Size
88KB
-
MD5
0eb14ed8e9f5e2a6346c1facab49af72
-
SHA1
816c031a8314cf57352d87d3a0dd1077dfa161c6
-
SHA256
29db1d5e270e80c17f86fa3a5c131488fc6c1f9e5242ef4469ffbe1a4f414f65
-
SHA512
79b2df09711a44b1c72863f037d2901860dd6aed456b395f31c6842a7a1c2e2fa2377bb8600a11a99bdb1540207ffadc7a6d98cdc33ea7631f3e84efdd1f4700
-
SSDEEP
1536:Hl/V9pTNKuo9pVtUe+JDkcxpjcx+oNbtpUzuA8eV/WQQQtU:HxVzNVQUPJDkcxSx+opKIa/WQQQt
Malware Config
Extracted
metasploit
windows/reverse_tcp
172.16.230.204:2422
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29db1d5e270e80c17f86fa3a5c131488fc6c1f9e5242ef4469ffbe1a4f414f65.exe