Analysis
-
max time kernel
93s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 17:04
Behavioral task
behavioral1
Sample
malware.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
malware.exe
Resource
win10v2004-20241007-en
General
-
Target
malware.exe
-
Size
72KB
-
MD5
97c374cd357d8a6b2b852de4273cadd1
-
SHA1
313fe9777f9ac997e450ddd9775d4df1f1bc9738
-
SHA256
24eab0a3d5d3e062a619b6b33b4cfc5b60748e1ee782841acfa956ad870e3230
-
SHA512
b07e908a3193b574c397010c057ae694b7a57b155c65d4fed42de1e573a2f4848f85db6c00db4ffe81a02d4df216280a8fe63454edec5ec978eca3cd198af9c0
-
SSDEEP
1536:ILTYdVOXot5KtNuEzzy45xD3uqBGMb+KR0Nc8QsJq39:u4t4i+Ge0Nc8QsC9
Malware Config
Extracted
metasploit
windows/exec
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language malware.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2268 2632 malware.exe 83 PID 2632 wrote to memory of 2268 2632 malware.exe 83 PID 2632 wrote to memory of 2268 2632 malware.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\malware.exe"C:\Users\Admin\AppData\Local\Temp\malware.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\cmd.execmd.exe /C echo 'OS{e7bb703a2c29b89cc8843eb01a9e984d}'2⤵
- System Location Discovery: System Language Discovery
PID:2268
-