Analysis
-
max time kernel
92s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 16:04
Behavioral task
behavioral1
Sample
0525da3b20f68ff9612f111c41e738e972f003e7b63a245d742e247e85e9e369.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0525da3b20f68ff9612f111c41e738e972f003e7b63a245d742e247e85e9e369.exe
Resource
win10v2004-20241007-en
General
-
Target
0525da3b20f68ff9612f111c41e738e972f003e7b63a245d742e247e85e9e369.exe
-
Size
72KB
-
MD5
643076fbd9c0ce0fc777167c276b884a
-
SHA1
e6294adb35a4ceeb027425b6faabe315ff79d408
-
SHA256
0525da3b20f68ff9612f111c41e738e972f003e7b63a245d742e247e85e9e369
-
SHA512
3b259f4aed381d88ad5591e904ed7aa957b4e0cfe24c3b672dfa388875bd200b7a4ab736ddce30daaffb5ef36c06980bb07f4d196664362d1d4a5e0966505ff1
-
SSDEEP
1536:IVvcShKq5DtsdvFQWwimXlXuQGnjHaAK3AyaMb+KR0Nc8QsJq3v:czMq5DEFH5gXu1n2AK3Ave0Nc8QsCv
Malware Config
Extracted
metasploit
windows/shell_bind_tcp
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0525da3b20f68ff9612f111c41e738e972f003e7b63a245d742e247e85e9e369.exe