Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 08:23
Behavioral task
behavioral1
Sample
neq32.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
neq32.exe
Resource
win10v2004-20241007-en
General
-
Target
neq32.exe
-
Size
72KB
-
MD5
a0b373c90fd7f85a7595569c53945a35
-
SHA1
cc7ec44c9930c8ea748ccd34da14cf9340624545
-
SHA256
c0dd6289af516f4ccc5d4775f6d73f6ae551d5984e9c463326705f20b7d5b34d
-
SHA512
9d6362aa9900d8b5fa1e5e65972dcb29363300d285388fe6c4e1001cfcedf18eeb938394e66e225cc7d153219127617c5dd751b63e9564512088360d08620fca
-
SSDEEP
1536:Iqjcy21QzvWBSisQy2FoSBi7Ev3wjc0tjcMb+KR0Nc8QsJq39:x7kQjWYXYFo3/1ce0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neq32.exe