Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 15:09
Static task
static1
Behavioral task
behavioral1
Sample
3200b2f1b5052ff6d279fdc8fa421527987979621754a1ec842b77c36bac3a25.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3200b2f1b5052ff6d279fdc8fa421527987979621754a1ec842b77c36bac3a25.exe
Resource
win10v2004-20241007-en
General
-
Target
3200b2f1b5052ff6d279fdc8fa421527987979621754a1ec842b77c36bac3a25.exe
-
Size
10KB
-
MD5
dd9163d4ed271cbdd1ad049e534cea03
-
SHA1
9de14a81e1085e73dc35b7c075f2db668c369318
-
SHA256
3200b2f1b5052ff6d279fdc8fa421527987979621754a1ec842b77c36bac3a25
-
SHA512
4f250fcc74a0f70c270567e304cf841e311043ea9e96ce58146eb83b9bb4e69cef1d86434a169345e4083558f4a1a2f99f7ad6d7874906d9b2b58c35f4f00f82
-
SSDEEP
192:7xDziBpfuI8/FSxHRlUWIV09Lst1DVSXlVy7E5pz6fMAWe6O:7xPiB38dSxHRlUYCvDVSy7vWe6
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.196.144:10010
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3200b2f1b5052ff6d279fdc8fa421527987979621754a1ec842b77c36bac3a25.exe