Analysis
-
max time kernel
105s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 23:02
Behavioral task
behavioral1
Sample
bc3bd98388d47321bce7e3dbf84a2cbc06e81a9c3c73c98392d1d22e5db2c60bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc3bd98388d47321bce7e3dbf84a2cbc06e81a9c3c73c98392d1d22e5db2c60bN.exe
Resource
win10v2004-20241007-en
General
-
Target
bc3bd98388d47321bce7e3dbf84a2cbc06e81a9c3c73c98392d1d22e5db2c60bN.exe
-
Size
72KB
-
MD5
ac552ffa99b2d5f6c6c0a1b0bef94480
-
SHA1
d3f841d00e8a2553e3d73aaa91fd573bc2ef5f69
-
SHA256
bc3bd98388d47321bce7e3dbf84a2cbc06e81a9c3c73c98392d1d22e5db2c60b
-
SHA512
3e3abdb38994cb9efa1769bc72484151e57fb399b12ab2fbb936db86bbeb1a0e8cdacc05d08dc7974c9d3749310aa4ed4f01064d08638ebf345b27643db84b48
-
SSDEEP
1536:IYbU/Q9BZRPa/P+W4a6T5WH5QTtC0gQn+AMb+KR0Nc8QsJq39:HbUI9BZRPi94XTCqTl9ve0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
10.10.10.128:5001
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc3bd98388d47321bce7e3dbf84a2cbc06e81a9c3c73c98392d1d22e5db2c60bN.exe