Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 08:53
Behavioral task
behavioral1
Sample
d648f94f32992c9258c6b76885a7af8deffa14b775379843bace9514d292c3ab.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d648f94f32992c9258c6b76885a7af8deffa14b775379843bace9514d292c3ab.exe
Resource
win10v2004-20241007-en
General
-
Target
d648f94f32992c9258c6b76885a7af8deffa14b775379843bace9514d292c3ab.exe
-
Size
818KB
-
MD5
4c80071e1d521f3b7ad9991df95ea058
-
SHA1
1194796fff17d5a2cb9e1e2e12e0412cfbcaec25
-
SHA256
d648f94f32992c9258c6b76885a7af8deffa14b775379843bace9514d292c3ab
-
SHA512
264f1c766b3fc85375660c65ab07c09fcc3204b4441ddee51cd17a0435a53a1ac703e9eb90f924396c10f1e6923903ab04ab14518504814303e41f7420fdb63f
-
SSDEEP
24576:hKavi92gKlHzZBmcM0R7TU3yS5XnUvoBSE:Li9SQB5mo5
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.188.135:4041
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d648f94f32992c9258c6b76885a7af8deffa14b775379843bace9514d292c3ab.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d648f94f32992c9258c6b76885a7af8deffa14b775379843bace9514d292c3ab.exe