Analysis
-
max time kernel
105s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 21:38
Behavioral task
behavioral1
Sample
31a9dbbac679588c70844be0e75486adc3f5d33ad5eff59a56a21598064aea45.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
31a9dbbac679588c70844be0e75486adc3f5d33ad5eff59a56a21598064aea45.exe
Resource
win10v2004-20241007-en
General
-
Target
31a9dbbac679588c70844be0e75486adc3f5d33ad5eff59a56a21598064aea45.exe
-
Size
72KB
-
MD5
296cfcac612b2204a315a998913ecb7e
-
SHA1
ac75b159baba5b618afceee7a5acaea5771dd89c
-
SHA256
31a9dbbac679588c70844be0e75486adc3f5d33ad5eff59a56a21598064aea45
-
SHA512
2f618d05ece311191140f818bdcd5107fd8ee25bd8d05637761cff66adec563d12c8d8c66c8b9f4ad66f753b40d6705de017c5aa5232b53fca8e9d5c29775cf3
-
SSDEEP
1536:IH20HXFl3vzfkHs3xEd/1ANlzAuM1Mb+KR0Nc8QsJq3P:5011ssBq1aUuoe0Nc8QsCP
Malware Config
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31a9dbbac679588c70844be0e75486adc3f5d33ad5eff59a56a21598064aea45.exe