Analysis
-
max time kernel
43s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 16:27
Static task
static1
Behavioral task
behavioral1
Sample
a1a5a009d62b15594b65c5ac0d132d20666b7b5374a3ae1c10b9208dad669a55N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a1a5a009d62b15594b65c5ac0d132d20666b7b5374a3ae1c10b9208dad669a55N.exe
Resource
win10v2004-20241007-en
General
-
Target
a1a5a009d62b15594b65c5ac0d132d20666b7b5374a3ae1c10b9208dad669a55N.exe
-
Size
14KB
-
MD5
87c587d17ea57fbef955e6e9e64e3b10
-
SHA1
4a59fa151b707bfaf0bdec16861342e8755d56b2
-
SHA256
a1a5a009d62b15594b65c5ac0d132d20666b7b5374a3ae1c10b9208dad669a55
-
SHA512
e7582ed495e852f8252092c3b134f9b13bde7b70c0ef1f68fa50141aa7ca9e9c59c1205dee2b8fa75e24229a073475469e8753888a6e4415427d96d6634615f3
-
SSDEEP
192:5HCugRK83SxHn2OQ/dmBI4KBPwgir+xz03kJXbqUqV/Qjo7AGa:xCxRKqbOCdWIVBPk+xzaqrfCXAn
Malware Config
Extracted
metasploit
windows/download_exec
http://119.29.238.164:50055/qCs5
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; Win64; x64; Trident/6.0)
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1a5a009d62b15594b65c5ac0d132d20666b7b5374a3ae1c10b9208dad669a55N.exe