Analysis
-
max time kernel
105s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 08:16
Behavioral task
behavioral1
Sample
1ed3244a329387b4286f59b0e39faaf970a417f5dd07c33830d03b8a1f1c2418N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1ed3244a329387b4286f59b0e39faaf970a417f5dd07c33830d03b8a1f1c2418N.exe
Resource
win10v2004-20241007-en
General
-
Target
1ed3244a329387b4286f59b0e39faaf970a417f5dd07c33830d03b8a1f1c2418N.exe
-
Size
72KB
-
MD5
edefd825a41d6073fb532fa418e4f2e0
-
SHA1
dc8144cc007d7b343e958f832d095f44fd51e0e6
-
SHA256
1ed3244a329387b4286f59b0e39faaf970a417f5dd07c33830d03b8a1f1c2418
-
SHA512
88f79bf40ce929b6b772d1921dc198f6ba7ea8651004439b7fce4bca1894c523f11913ff110c3e64ab126d4d484b0a87d7012b9ac876a545f936b1d364aaa163
-
SSDEEP
1536:I0itEL6cywsIf/vf9E2Wd7OmMb+KR0Nc8QsJq39:g+fsIrWame0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.221.141:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1ed3244a329387b4286f59b0e39faaf970a417f5dd07c33830d03b8a1f1c2418N.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ed3244a329387b4286f59b0e39faaf970a417f5dd07c33830d03b8a1f1c2418N.exe