Resubmissions
04/10/2024, 15:22
241004-sr8taavhrd 10Analysis
-
max time kernel
16s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 15:22
Behavioral task
behavioral1
Sample
windows-encoded.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
windows-encoded.exe
Resource
win10v2004-20240802-en
General
-
Target
windows-encoded.exe
-
Size
72KB
-
MD5
aff874776473aaa45ed321e4fa146f3d
-
SHA1
fbb2d343b4f60501922758b1f8113c930d4508ee
-
SHA256
77af575567800a7dc1a6e7c75c0d133e6d94b8929bb9c3b4fa696430535549c4
-
SHA512
26bd612f26b6ccdf89c1b3090e951fa3c52ce493b39501aaef59bc08b1717b83a811ca57ecfb5fd73d1dcd9c966b7e2b59fcc6ab32279ebe67ceffa7a908844e
-
SSDEEP
1536:IxgpeA0gpxp1eFJM38IN5r+9KzhZ5iMb+KR0Nc8QsJq39:Ag8A0OxT4Szr+oz8e0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows-encoded.exe