Analysis
-
max time kernel
95s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 08:08
Behavioral task
behavioral1
Sample
4daa416b094e4176747ce9b60348c80a2012320e6da5f5e31443b39b73c44528.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4daa416b094e4176747ce9b60348c80a2012320e6da5f5e31443b39b73c44528.exe
Resource
win10v2004-20241007-en
General
-
Target
4daa416b094e4176747ce9b60348c80a2012320e6da5f5e31443b39b73c44528.exe
-
Size
246KB
-
MD5
e44e956b3392a1b7eeb7f7973a88f991
-
SHA1
1ed27459c84801b37c93f51844be65c94bf7ad88
-
SHA256
4daa416b094e4176747ce9b60348c80a2012320e6da5f5e31443b39b73c44528
-
SHA512
a337344b3588f518b824f42153ff027f8dcc8a7b484571b2bfc5d48d238b861732eb6ece96922d2314da1ae7851084258f936054871f887228cb5ea6b39d1d82
-
SSDEEP
6144:PqGdXu6wZ0Nc8QsArocPndp64e8Ga6WTZa2uzH9j0:jlu6Gsc1IETZa2uzdo
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Program crash 2 IoCs
pid pid_target Process procid_target 448 2152 WerFault.exe 81 2160 2152 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4daa416b094e4176747ce9b60348c80a2012320e6da5f5e31443b39b73c44528.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4daa416b094e4176747ce9b60348c80a2012320e6da5f5e31443b39b73c44528.exe"C:\Users\Admin\AppData\Local\Temp\4daa416b094e4176747ce9b60348c80a2012320e6da5f5e31443b39b73c44528.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 2602⤵
- Program crash
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 2682⤵
- Program crash
PID:2160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2152 -ip 21521⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2152 -ip 21521⤵PID:5012