Analysis
-
max time kernel
110s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 19:23
Behavioral task
behavioral1
Sample
69c47beb093250556f97c814c422dcfafb902fbef6ee8eba97764ac478950c23.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
69c47beb093250556f97c814c422dcfafb902fbef6ee8eba97764ac478950c23.exe
Resource
win10v2004-20241007-en
General
-
Target
69c47beb093250556f97c814c422dcfafb902fbef6ee8eba97764ac478950c23.exe
-
Size
46KB
-
MD5
1dd9287bef4915570d34424dfcaf453b
-
SHA1
a708671e84c10e3208759251fefcb3ce4ea6756f
-
SHA256
69c47beb093250556f97c814c422dcfafb902fbef6ee8eba97764ac478950c23
-
SHA512
cb60a1030d0efdd573f8ba294f29bf3e9f65e5d66bbaf22600c6b073ea402ec17905bfc11e9a739bd626275751ba76eb53e50ba95a105441d23ce4cfb6e247db
-
SSDEEP
768:IUJhfx0FdmPKpCoeexG/cikTK3hyRf38pLjiiQ9026CNDIYcnbcuyD7UFq3Q:IAfxMdFpB1GYTiwL6C9Dcnouy8Fq3Q
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
46.183.27.148:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
resource yara_rule behavioral1/memory/1732-0-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/1732-2-0x0000000000400000-0x000000000041A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69c47beb093250556f97c814c422dcfafb902fbef6ee8eba97764ac478950c23.exe