Analysis
-
max time kernel
43s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 04:45
Static task
static1
Behavioral task
behavioral1
Sample
c15bbf951510c8c9df091d1f875d9a41f12472074abed85b980460bdc4cccd8c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c15bbf951510c8c9df091d1f875d9a41f12472074abed85b980460bdc4cccd8c.exe
Resource
win10v2004-20240802-en
General
-
Target
c15bbf951510c8c9df091d1f875d9a41f12472074abed85b980460bdc4cccd8c.exe
-
Size
14KB
-
MD5
3011ed30813d250225ffbf47a9478198
-
SHA1
ee158a9b17a872f2d1ac53249f2aa60e6c388fca
-
SHA256
c15bbf951510c8c9df091d1f875d9a41f12472074abed85b980460bdc4cccd8c
-
SHA512
c064e2d06f05f98235834bf678265af752065632eb71dd2e0b65175c91dad61441473d4bfba77ff8bda9098056b32fdd5a11e77a8e9bf241f677e5afe9d22bfb
-
SSDEEP
192:E3mbPYCfMcrfOIuZmvKQxtzlSIVX6NOwSjzZEwejDMN1:LMCfrfQ6tBSIVzaweUN1
Malware Config
Extracted
metasploit
windows/download_exec
http://192.168.45.131:9999/SIFz
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; LBBROWSER)
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c15bbf951510c8c9df091d1f875d9a41f12472074abed85b980460bdc4cccd8c.exe