Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 15:49
Behavioral task
behavioral1
Sample
356934f9e5aea961dd35e182aa8c292101bb930e9d4cdf894d25f081d2ccea88N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
356934f9e5aea961dd35e182aa8c292101bb930e9d4cdf894d25f081d2ccea88N.exe
Resource
win10v2004-20241007-en
General
-
Target
356934f9e5aea961dd35e182aa8c292101bb930e9d4cdf894d25f081d2ccea88N.exe
-
Size
72KB
-
MD5
c4e74792f0529590394211ac0bb63480
-
SHA1
88cf8bb6e3ba6aede422a879afac0bde7e63fa1d
-
SHA256
356934f9e5aea961dd35e182aa8c292101bb930e9d4cdf894d25f081d2ccea88
-
SHA512
d88791974bc670c9d4e169fbd56f956c566a8afd60617dc8940971a2f06cba065c4b5c6f220c95ea6bc91c3e5ba365f96e8d74bd934118fe273a31983b9f4d0e
-
SSDEEP
1536:IMcP8KyKwsw3mOsDWeNQ+cm2DMb+KR0Nc8QsJq39:RB8wbWHDDW+cbDe0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 356934f9e5aea961dd35e182aa8c292101bb930e9d4cdf894d25f081d2ccea88N.exe