Analysis
-
max time kernel
105s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 07:52
Behavioral task
behavioral1
Sample
ece68ec1abc2eef7119e13da3a48142471d9f1ef53293c5fe104922dc66a26afN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ece68ec1abc2eef7119e13da3a48142471d9f1ef53293c5fe104922dc66a26afN.exe
Resource
win10v2004-20241007-en
General
-
Target
ece68ec1abc2eef7119e13da3a48142471d9f1ef53293c5fe104922dc66a26afN.exe
-
Size
72KB
-
MD5
8ba54d75215f70b3ae052d1f29c57070
-
SHA1
ce6969b1fb3c8c52e05ac6d0b750e3dea18667b5
-
SHA256
ece68ec1abc2eef7119e13da3a48142471d9f1ef53293c5fe104922dc66a26af
-
SHA512
e624f9d33c96fa43af7f927cfbc98c4c32713683525c92ebb303b044fa9a79519579107d1a2f74e7e5e46543a40cabdc10a87d6f01842fa31c57f7560d80ea15
-
SSDEEP
1536:IyISUe08C+2zqWGknxrn6A6BUzqI1atFCC7O6uKorMb+KR0Nc8QsJq39:USPN2SknxO7BUzqI1aqCKlnre0Nc8Qss
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.2.128:6001
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ece68ec1abc2eef7119e13da3a48142471d9f1ef53293c5fe104922dc66a26afN.exe