Analysis
-
max time kernel
105s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 08:33
Behavioral task
behavioral1
Sample
dd5d7fc2f4352e2543fcd30f0cb405696a2ee93e595d093043ffe1bf62271227N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dd5d7fc2f4352e2543fcd30f0cb405696a2ee93e595d093043ffe1bf62271227N.exe
Resource
win10v2004-20241007-en
General
-
Target
dd5d7fc2f4352e2543fcd30f0cb405696a2ee93e595d093043ffe1bf62271227N.exe
-
Size
72KB
-
MD5
3427976b6bc90fd75b9705fd48973360
-
SHA1
11f66dedb5e520a23be2198e61557bd3027de7aa
-
SHA256
dd5d7fc2f4352e2543fcd30f0cb405696a2ee93e595d093043ffe1bf62271227
-
SHA512
fd0ea7d2d47dc1b38c87757543d5f20424092be0cc0ad52e7d3bb83eec6b2787e20984a8f104881ee02dc4bab372f03a41dbeaec96fff3a96f8fe255bed241a0
-
SSDEEP
1536:IsVaEfqULXGmue1LWNCaMb+KR0Nc8QsJq39:DVRfqSXGmueZW4ae0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
172.168.1.1:443
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd5d7fc2f4352e2543fcd30f0cb405696a2ee93e595d093043ffe1bf62271227N.exe