Analysis
-
max time kernel
111s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 03:13
Static task
static1
Behavioral task
behavioral1
Sample
39d96371da137f3de9f366d0f8bced63269e9759dd432b0b608978ce06ef525a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39d96371da137f3de9f366d0f8bced63269e9759dd432b0b608978ce06ef525a.exe
Resource
win10v2004-20241007-en
General
-
Target
39d96371da137f3de9f366d0f8bced63269e9759dd432b0b608978ce06ef525a.exe
-
Size
3KB
-
MD5
68852f4183e4b04ba78ed1f2c2124b7a
-
SHA1
5aa806c168daaee3333f0a4090c4f2f3199cae21
-
SHA256
39d96371da137f3de9f366d0f8bced63269e9759dd432b0b608978ce06ef525a
-
SHA512
2ed2220bde3f7bbd35582d865a43dcb580a1fc29741e8f2b302faed4615296acb8301f2cc8c664b2d336794ee411bc9c1e7473f863994f51967a6a488798f8b2
Malware Config
Extracted
metasploit
windows/reverse_tcp
10.0.2.9:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39d96371da137f3de9f366d0f8bced63269e9759dd432b0b608978ce06ef525a.exe