Analysis
-
max time kernel
105s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 18:28
Behavioral task
behavioral1
Sample
1ea83cd8d0c4e4bae0350134557b78405b0e1c0d4efb9894a284d2c608b08542N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1ea83cd8d0c4e4bae0350134557b78405b0e1c0d4efb9894a284d2c608b08542N.exe
Resource
win10v2004-20241007-en
General
-
Target
1ea83cd8d0c4e4bae0350134557b78405b0e1c0d4efb9894a284d2c608b08542N.exe
-
Size
72KB
-
MD5
9b03ef15da6ed0f5a550ce65e509adf0
-
SHA1
c3de24879caaa97bda14496a3030f32973b667f7
-
SHA256
1ea83cd8d0c4e4bae0350134557b78405b0e1c0d4efb9894a284d2c608b08542
-
SHA512
5dbcdcf3610b24b7ec5bc7a0910caed361c7b3c807767ab5b273576b3d40266ccd2d9ff5639fcc1e75000be86a860dfff29ba3acaa9a430eb187f3b9e557ffff
-
SSDEEP
1536:IoVcsjVOR4T2FwVnqwX8AzHOkMb+KR0Nc8QsJq39:nJA4T2aVqwXvve0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.47.141:2404
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1ea83cd8d0c4e4bae0350134557b78405b0e1c0d4efb9894a284d2c608b08542N.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ea83cd8d0c4e4bae0350134557b78405b0e1c0d4efb9894a284d2c608b08542N.exe