Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 03:42
Behavioral task
behavioral1
Sample
e1927cf36d87a89ecda832763a5ae406b260b829380b3a3e97b05af7ef243bf0.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e1927cf36d87a89ecda832763a5ae406b260b829380b3a3e97b05af7ef243bf0.exe
Resource
win10v2004-20241007-en
General
-
Target
e1927cf36d87a89ecda832763a5ae406b260b829380b3a3e97b05af7ef243bf0.exe
-
Size
74KB
-
MD5
a5c2f55068bb7be6e6757deee82319d5
-
SHA1
441bb64abb0b7a20fedaf0a2c2d2923fc42f1452
-
SHA256
e1927cf36d87a89ecda832763a5ae406b260b829380b3a3e97b05af7ef243bf0
-
SHA512
7c778ad2ddd146064d0dc3240c3065359112358f92f9a7ca323a23a74763b18b76bcd9858a7af59e47d90e9e298ae53081fe4d9a87f997541473d037e31a639f
-
SSDEEP
1536:IDzqTCKkxPHd2EuxGxwFMb+KR0Nc8QsJq30Rfq3:WzqTC/VXu6wFe0Nc8QsC0S
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.0.40:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1927cf36d87a89ecda832763a5ae406b260b829380b3a3e97b05af7ef243bf0.exe