Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
2c1d2f958eeff4975c3ad0c53b28b1f07b6bd475191d41a968e01ef50659b309.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c1d2f958eeff4975c3ad0c53b28b1f07b6bd475191d41a968e01ef50659b309.exe
Resource
win10v2004-20241007-en
General
-
Target
2c1d2f958eeff4975c3ad0c53b28b1f07b6bd475191d41a968e01ef50659b309.exe
-
Size
293KB
-
MD5
9de97f9e725e14ee5ffffd66f4f5e42a
-
SHA1
442b53904571e80b37d110311036ac7f59b16a31
-
SHA256
2c1d2f958eeff4975c3ad0c53b28b1f07b6bd475191d41a968e01ef50659b309
-
SHA512
27718ce3360554321fd3185afc7aa94408e714bb79b5aa26c1d015ed1052e431b811e590b7120bd884276b1d531af750999ba39c036ecaca43b55724e3eaa12f
-
SSDEEP
6144:WkWS459S6Xa1Eqqg36KDe8R+lJOOWjqO/VtfbgkgZ:W+K0ZO1aNi9291/vW
Malware Config
Extracted
metasploit
windows/download_exec
http://120.46.212.33:9999/DuUN
- headers User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322)
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c1d2f958eeff4975c3ad0c53b28b1f07b6bd475191d41a968e01ef50659b309.exe