Analysis
-
max time kernel
105s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 20:45
Behavioral task
behavioral1
Sample
807c2dfd9d98a7e53e7d06e50ca2d2552ffe606514b51d20e8c672beccd6392bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
807c2dfd9d98a7e53e7d06e50ca2d2552ffe606514b51d20e8c672beccd6392bN.exe
Resource
win10v2004-20241007-en
General
-
Target
807c2dfd9d98a7e53e7d06e50ca2d2552ffe606514b51d20e8c672beccd6392bN.exe
-
Size
72KB
-
MD5
b2a997388e19cc26104f5a2ef64de300
-
SHA1
ac999867301ab599eec053e165bc0677905c13f4
-
SHA256
807c2dfd9d98a7e53e7d06e50ca2d2552ffe606514b51d20e8c672beccd6392b
-
SHA512
50b9e92929b942fa6f5322cdf16cb118698c5b7303059df43368a08ac7792828f94daf587a26fbeda7ef3c148793fc5cd510c1d036e8fde36452919afe23c9c5
-
SSDEEP
1536:IBnoxJNt3FkD2N3OFsyg8nX2VpCcLbttGMb+KR0Nc8QsJq39:2YfnkiN3dQnX2VplLxtGe0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.1.100:8080
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
807c2dfd9d98a7e53e7d06e50ca2d2552ffe606514b51d20e8c672beccd6392bN.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 807c2dfd9d98a7e53e7d06e50ca2d2552ffe606514b51d20e8c672beccd6392bN.exe