Analysis
-
max time kernel
106s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 13:59
Behavioral task
behavioral1
Sample
41d75595cc2defeabca00134a9d9a83c8b036f9f11e2b9988c77bb43320ed6e7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
41d75595cc2defeabca00134a9d9a83c8b036f9f11e2b9988c77bb43320ed6e7.exe
Resource
win10v2004-20241007-en
General
-
Target
41d75595cc2defeabca00134a9d9a83c8b036f9f11e2b9988c77bb43320ed6e7.exe
-
Size
101KB
-
MD5
b043afcf12cae637031f638c7b7b1194
-
SHA1
307ac57eb43562a337ab798c8b72a1c932c2a224
-
SHA256
41d75595cc2defeabca00134a9d9a83c8b036f9f11e2b9988c77bb43320ed6e7
-
SHA512
a077849bd0acf7bfa75088ba22294db2f7b613855deeada6c57b37ea8e9e1dbb60f3c0312ab4db74696a07062d9a9c5a10eb6f32ba5dfaef3ef5ec65a35c70cf
-
SSDEEP
1536:t9nFwbSNmCij6z7l+KheSjaFbBNvKpUySy:jq6z7fheBNINSy
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
10.10.1.13:444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Program crash 2 IoCs
pid pid_target Process procid_target 412 4060 WerFault.exe 82 5040 4060 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41d75595cc2defeabca00134a9d9a83c8b036f9f11e2b9988c77bb43320ed6e7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41d75595cc2defeabca00134a9d9a83c8b036f9f11e2b9988c77bb43320ed6e7.exe"C:\Users\Admin\AppData\Local\Temp\41d75595cc2defeabca00134a9d9a83c8b036f9f11e2b9988c77bb43320ed6e7.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 2442⤵
- Program crash
PID:412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 1642⤵
- Program crash
PID:5040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4060 -ip 40601⤵PID:464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4060 -ip 40601⤵PID:4772