Analysis
-
max time kernel
32s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 21:21
Behavioral task
behavioral1
Sample
ee1bdb262147ab20398098456e5283f7c14f05c10b009936731c7c01d0e4f708N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ee1bdb262147ab20398098456e5283f7c14f05c10b009936731c7c01d0e4f708N.exe
Resource
win10v2004-20241007-en
General
-
Target
ee1bdb262147ab20398098456e5283f7c14f05c10b009936731c7c01d0e4f708N.exe
-
Size
72KB
-
MD5
f46e6764d130ee43e0512bd836be93e0
-
SHA1
fba7b5e0575f07b298dc165eb8f48482ef332d14
-
SHA256
ee1bdb262147ab20398098456e5283f7c14f05c10b009936731c7c01d0e4f708
-
SHA512
d6ce0bb548e05a1b9bf6ce973e84947065b83906d48e6e84b31e57d0723538767d1ee74e1ae7f2d689158a12092e7d4868b4af7d93bafea7d9317428c01b0687
-
SSDEEP
1536:ILTYdVOXof15KtNuEzzy45xD3uqBGMb+KR0Nc8QsJq39:u4f14i+Ge0Nc8QsC9
Malware Config
Extracted
metasploit
windows/exec
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ee1bdb262147ab20398098456e5283f7c14f05c10b009936731c7c01d0e4f708N.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee1bdb262147ab20398098456e5283f7c14f05c10b009936731c7c01d0e4f708N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
ee1bdb262147ab20398098456e5283f7c14f05c10b009936731c7c01d0e4f708N.exedescription pid Process procid_target PID 2252 wrote to memory of 2300 2252 ee1bdb262147ab20398098456e5283f7c14f05c10b009936731c7c01d0e4f708N.exe 30 PID 2252 wrote to memory of 2300 2252 ee1bdb262147ab20398098456e5283f7c14f05c10b009936731c7c01d0e4f708N.exe 30 PID 2252 wrote to memory of 2300 2252 ee1bdb262147ab20398098456e5283f7c14f05c10b009936731c7c01d0e4f708N.exe 30 PID 2252 wrote to memory of 2300 2252 ee1bdb262147ab20398098456e5283f7c14f05c10b009936731c7c01d0e4f708N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee1bdb262147ab20398098456e5283f7c14f05c10b009936731c7c01d0e4f708N.exe"C:\Users\Admin\AppData\Local\Temp\ee1bdb262147ab20398098456e5283f7c14f05c10b009936731c7c01d0e4f708N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\cmd.execmd.exe /C echo 'OS{80d441739ffe13057becc061440be2fe}'2⤵
- System Location Discovery: System Language Discovery
PID:2300
-