Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:46
Behavioral task
behavioral1
Sample
d1a049cd08d6dbbd4d368cae23e7ed13b60897d3056e64ed33e8ac1cc335a056N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1a049cd08d6dbbd4d368cae23e7ed13b60897d3056e64ed33e8ac1cc335a056N.exe
Resource
win10v2004-20241007-en
General
-
Target
d1a049cd08d6dbbd4d368cae23e7ed13b60897d3056e64ed33e8ac1cc335a056N.exe
-
Size
72KB
-
MD5
ad08f742edb207ab86509fa73ff5d250
-
SHA1
0c567145ba71a4e9e2923fbb1959dc6050af8b31
-
SHA256
d1a049cd08d6dbbd4d368cae23e7ed13b60897d3056e64ed33e8ac1cc335a056
-
SHA512
003b9bcbe2d00a18e32f91e0173a6f403f92b12e4adc321046434d13f7c5623fd0efd8306ec4ab2e03773b98a11a67a7770bff2d1f3ac1deacb02ded35276755
-
SSDEEP
1536:If2TF//a136T0d11z1OKrVZSIxA0Mb+KR0Nc8QsJq39:TTh/atj11z1OK7SIxxe0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
10.11.164.244:443
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1a049cd08d6dbbd4d368cae23e7ed13b60897d3056e64ed33e8ac1cc335a056N.exe