Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 06:54
Behavioral task
behavioral1
Sample
bfe832dd29e58d5688614981f21252bc2860a387a11368ee25037a1f2da617a8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bfe832dd29e58d5688614981f21252bc2860a387a11368ee25037a1f2da617a8.exe
Resource
win10v2004-20241007-en
General
-
Target
bfe832dd29e58d5688614981f21252bc2860a387a11368ee25037a1f2da617a8.exe
-
Size
42KB
-
MD5
5525330f29a4711edc4f8d4734400979
-
SHA1
1e85f380c826f869264775f6a638ca9533f8770e
-
SHA256
bfe832dd29e58d5688614981f21252bc2860a387a11368ee25037a1f2da617a8
-
SHA512
dcd7861dee9a78b077e3b0222f350f843fea992fc7faf944833f452d80a0f061e8bc398331bf23fe72d9c9a72ad13aff0bff3146242c5f0099095c52e121b569
-
SSDEEP
384:rKPSlHuSvzpFoqV55pdM1upCfGzEyno8YhWi0wPh0gSXKEBuD2pre:rKPSugpFrDPMsTqhWqhFSXBBuDCr
Malware Config
Extracted
metasploit
windows/download_exec
http://106.15.120.243:8879/dAvA
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bfe832dd29e58d5688614981f21252bc2860a387a11368ee25037a1f2da617a8.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfe832dd29e58d5688614981f21252bc2860a387a11368ee25037a1f2da617a8.exe