Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 04:50
Behavioral task
behavioral1
Sample
5448a1f256eaec96c17bdd16e1db7ded05614ed2b3ca230041b0708a4cfe506a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5448a1f256eaec96c17bdd16e1db7ded05614ed2b3ca230041b0708a4cfe506a.exe
Resource
win10v2004-20241007-en
General
-
Target
5448a1f256eaec96c17bdd16e1db7ded05614ed2b3ca230041b0708a4cfe506a.exe
-
Size
72KB
-
MD5
9d54900e9a48cb6cfb8c609f27abb8be
-
SHA1
551e577b967476acb7742571602c3c64245c89d5
-
SHA256
5448a1f256eaec96c17bdd16e1db7ded05614ed2b3ca230041b0708a4cfe506a
-
SHA512
26ce16646bc6141cddd9638413358673335c0fc6154cd80ff299ad6ef88f6abe08970260ce40bff3ad6e90d693ef7c44e2c68850871595dec2a6fc6094053c6a
-
SSDEEP
1536:If3h5JAkSnyj4iI7cV3ku536IDuwCiMb+KR0Nc8QsJq3f:C3/2PCI6TdDuw7e0Nc8QsCf
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5448a1f256eaec96c17bdd16e1db7ded05614ed2b3ca230041b0708a4cfe506a.exe