Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/09/2024, 08:43
Behavioral task
behavioral1
Sample
Windows11.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Windows11.exe
Resource
win10v2004-20240802-en
General
-
Target
Windows11.exe
-
Size
72KB
-
MD5
a0b235951575a7f8f9c0453da885156d
-
SHA1
abc8cba106badb6401d669cc570b282dffda7de1
-
SHA256
764b69b152c9b30772110a35a29c3e0d0be0ba3ab046c8879d6b8f59489c3763
-
SHA512
85f88cc775b4761ab35548006452b9e89dd534c7762304d5f68f7444027fdeaf89bc2335a6ec804f4dca028ed7dcf425f4a316a4381417c06b03eeb8417fda0c
-
SSDEEP
1536:IHyHlD5zffXKYp6oOKfrX1P/HsgESs63aZMb+KR0Nc8QsJq39:UyFD5zffaYMhKjX9/Hrr+e0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
193.117.208.101:7777
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows11.exe