Analysis
-
max time kernel
105s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 04:14
Behavioral task
behavioral1
Sample
1017120965e64e356421ec566405a55fcd2165997d0818eb5ecc2906fc57b0ffN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1017120965e64e356421ec566405a55fcd2165997d0818eb5ecc2906fc57b0ffN.exe
Resource
win10v2004-20241007-en
General
-
Target
1017120965e64e356421ec566405a55fcd2165997d0818eb5ecc2906fc57b0ffN.exe
-
Size
72KB
-
MD5
f6ca75998712108e7d0c9596b1bacdf0
-
SHA1
607b9cb3a093cc578af3749e4aa4cb524c94c9db
-
SHA256
1017120965e64e356421ec566405a55fcd2165997d0818eb5ecc2906fc57b0ff
-
SHA512
36f986329d9bd09194af648ea591c1bd450e08974e47906a8cf48de57c7f1015d0a4260af57d2f5f18755e6705542d9fab568efefd4066920c49d8b3671e2365
-
SSDEEP
1536:ImMyhVdP3RQZZ/QECCRU1f4HUlLWuKeBmFN1fBLHozMb+KR0Nc8QsJq39:nMsVdP3RQrNPU1f4HEnsTVBjee0Nc8Qb
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.210.132:443
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1017120965e64e356421ec566405a55fcd2165997d0818eb5ecc2906fc57b0ffN.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1017120965e64e356421ec566405a55fcd2165997d0818eb5ecc2906fc57b0ffN.exe