Analysis
-
max time kernel
105s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 03:10
Behavioral task
behavioral1
Sample
b5d69a2fe04f624a7c1469b0cfc1833d9fae77e6f6fb4c3b9c95f16c0d789c6dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b5d69a2fe04f624a7c1469b0cfc1833d9fae77e6f6fb4c3b9c95f16c0d789c6dN.exe
Resource
win10v2004-20241007-en
General
-
Target
b5d69a2fe04f624a7c1469b0cfc1833d9fae77e6f6fb4c3b9c95f16c0d789c6dN.exe
-
Size
72KB
-
MD5
493c810d0c29ae471eca69dd53667380
-
SHA1
e3fdfea637d1905c53e24f849df372818f502bae
-
SHA256
b5d69a2fe04f624a7c1469b0cfc1833d9fae77e6f6fb4c3b9c95f16c0d789c6d
-
SHA512
e2e2148ff5d265ff744398e62a9a9b9ffe6de2fc62d707523470cb686b380a158dd49b1005c7f6ed910fe81dfe390c1d7944af22ba648d9e8b3a240038e1dbd0
-
SSDEEP
768:IeyLqc0nL47KE3vJsBVddCYZ2+qzFjXfVemRi9Ldkm5n8MkJ0PCHSckzCScx4qXx:Irs2fJs3hQxjaRyN0Mb+KR0Nc8QsJq39
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.213.251:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5d69a2fe04f624a7c1469b0cfc1833d9fae77e6f6fb4c3b9c95f16c0d789c6dN.exe