Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 09:14
Behavioral task
behavioral1
Sample
b06f5d3ffc537f6a1279cec8ce0f35bf4dcbf6e024b20e125cb3632af3dd6f19.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b06f5d3ffc537f6a1279cec8ce0f35bf4dcbf6e024b20e125cb3632af3dd6f19.exe
Resource
win10v2004-20241007-en
General
-
Target
b06f5d3ffc537f6a1279cec8ce0f35bf4dcbf6e024b20e125cb3632af3dd6f19.exe
-
Size
273KB
-
MD5
5f095f61d90068a5bef8864a42d2db93
-
SHA1
4c3b1aa82d6d816b97a3b9d88c6991c0ef3ed36d
-
SHA256
b06f5d3ffc537f6a1279cec8ce0f35bf4dcbf6e024b20e125cb3632af3dd6f19
-
SHA512
4ebc18bcaa2b2dd5d5c11d54630e123f73ed1010a697c8e57521f049570294c721e6b4afa96f72da8d0cb37f700508b4dd635e32fb4192c1581b42931995bb38
-
SSDEEP
3072:aN/bNf5vySI8nolTz6EfbPw861SsM9t95ZBfqp3q6OB5GAa6TojkpF/R7ObtQvp2:S/Zf5vy6K36EfbPw861r1e5G562kpiD
Malware Config
Extracted
metasploit
windows/download_exec
http://192.168.150.128:8080/Signin
- headers Connection: close Sec-Fetch-Site: same-origin Sec-Fetch-Mode: navigate Sec-Fetch-User: ?1 Sec-Detch-Dest: document User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 12_1_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Mobile/16C104
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b06f5d3ffc537f6a1279cec8ce0f35bf4dcbf6e024b20e125cb3632af3dd6f19.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b06f5d3ffc537f6a1279cec8ce0f35bf4dcbf6e024b20e125cb3632af3dd6f19.exe