Analysis
-
max time kernel
134s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 00:03
Behavioral task
behavioral1
Sample
76bb2ab836694a1896991254cadbc6a686c42e9a6b8ef54b95265f43b34ad517.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
76bb2ab836694a1896991254cadbc6a686c42e9a6b8ef54b95265f43b34ad517.exe
Resource
win10v2004-20241007-en
General
-
Target
76bb2ab836694a1896991254cadbc6a686c42e9a6b8ef54b95265f43b34ad517.exe
-
Size
72KB
-
MD5
7105b6f716dc44c444e4f3d2968bea19
-
SHA1
ca5e329d50300b69c6b87d4dfc5001a10094cb01
-
SHA256
76bb2ab836694a1896991254cadbc6a686c42e9a6b8ef54b95265f43b34ad517
-
SHA512
f92afca123ee8dca59ae1f4bb796028a81309f4044f3eb974149d00d62d319889cc6f9ce459b93f058dc3d99ab7afc2129517825e10ee014485dfc2b9167a028
-
SSDEEP
1536:IEqCrWK1Pi/KaWi5VwqnloGxhpc/bJE8nm+SMb+KR0Nc8QsJq39:xqCrWUPi/5WiDwcoG3pcDmmSe0Nc8Qss
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
10.5.238.79:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
76bb2ab836694a1896991254cadbc6a686c42e9a6b8ef54b95265f43b34ad517.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76bb2ab836694a1896991254cadbc6a686c42e9a6b8ef54b95265f43b34ad517.exe