Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 03:33
Behavioral task
behavioral1
Sample
c43cf5b198b6995088c5e170e9c887f59cf44f12cb463864fe392c88fe17d61d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c43cf5b198b6995088c5e170e9c887f59cf44f12cb463864fe392c88fe17d61d.exe
Resource
win10v2004-20241007-en
General
-
Target
c43cf5b198b6995088c5e170e9c887f59cf44f12cb463864fe392c88fe17d61d.exe
-
Size
72KB
-
MD5
aad9fad2f84407d1e608c968c177d763
-
SHA1
c5a95f0428527016583a40a9e3bf118520733b30
-
SHA256
c43cf5b198b6995088c5e170e9c887f59cf44f12cb463864fe392c88fe17d61d
-
SHA512
969a708d9de345c043c7ed59c8ca5075b8735199c2a7f789e7d23dc2c22762b854f75d00b2f97f2134659b8fe4265d512322e4658a8cab645df08ebc2d779e49
-
SSDEEP
1536:I3Z1euA4mBAcpCTcfNOy9i2Mb+KR0Nc8QsJq39:WHAvMcfNJ1e0Nc8QsC9
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.198.131:444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c43cf5b198b6995088c5e170e9c887f59cf44f12cb463864fe392c88fe17d61d.exe