Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 14:11
Static task
static1
Behavioral task
behavioral1
Sample
ccb39945aa9cb28f9bbc6895525ee21791c83acb7bb0075dc845d8c84bb09108.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ccb39945aa9cb28f9bbc6895525ee21791c83acb7bb0075dc845d8c84bb09108.exe
Resource
win10v2004-20241007-en
General
-
Target
ccb39945aa9cb28f9bbc6895525ee21791c83acb7bb0075dc845d8c84bb09108.exe
-
Size
14KB
-
MD5
9136f4f48e6075a604849be03d7c6d11
-
SHA1
a91bf5280e7ec8ea3446b03ad74d6c75924828b2
-
SHA256
ccb39945aa9cb28f9bbc6895525ee21791c83acb7bb0075dc845d8c84bb09108
-
SHA512
1e37aebfa272c3932cc5b8d677b676bd553a0f3168fc4d86b4864ed05d417f8db6b08dbeee17f11e3287117f07a8e754a477bda38d6a7871da48bb1fc4d30252
-
SSDEEP
192:O3mbPYCfMcrfOIuZmvKQxtzlSIVX6NOlKEYjVXejDMN1:NMCfrfQ6tBSIXgpeUN1
Malware Config
Extracted
metasploit
windows/download_exec
http://8.138.5.136:2233/ReSR
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0; MANM; MANM)
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ccb39945aa9cb28f9bbc6895525ee21791c83acb7bb0075dc845d8c84bb09108.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccb39945aa9cb28f9bbc6895525ee21791c83acb7bb0075dc845d8c84bb09108.exe