Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 22:41
Behavioral task
behavioral1
Sample
b5cd4a58a52020dad6ee4b219b031e4be4d6839ad7f7bcf5163e4850cc605085.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b5cd4a58a52020dad6ee4b219b031e4be4d6839ad7f7bcf5163e4850cc605085.exe
Resource
win10v2004-20241007-en
General
-
Target
b5cd4a58a52020dad6ee4b219b031e4be4d6839ad7f7bcf5163e4850cc605085.exe
-
Size
9KB
-
MD5
ea7c5250e827ea368dcc3f7f9b296bf0
-
SHA1
ef9632ae1a6740137e04a5289e64396f3bfd56d4
-
SHA256
b5cd4a58a52020dad6ee4b219b031e4be4d6839ad7f7bcf5163e4850cc605085
-
SHA512
46910e9156ea01dbdf38ca11cd265dc1848e184f71c95cd672a5c58a6b63190e743dcc77062c4edc2c3ce1c830220aa64641bf05d81fa16902ea0c0c0b9d5681
-
SSDEEP
192:MUanrjzinBmgjjOGC5rG7E5pz6HJoZg26f2lQ:9KzCBmKj5SG7CO26oQ
Malware Config
Extracted
metasploit
windows/download_exec
http://192.168.202.131:80/Nc9r
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0; Touch; MALCJS)
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b5cd4a58a52020dad6ee4b219b031e4be4d6839ad7f7bcf5163e4850cc605085.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5cd4a58a52020dad6ee4b219b031e4be4d6839ad7f7bcf5163e4850cc605085.exe