Analysis
-
max time kernel
140s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 19:37
Behavioral task
behavioral1
Sample
85ca9458d96c34a7f5dc730658b07cd1070edf9fae7091fdc1e01f6a0d421e67.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
85ca9458d96c34a7f5dc730658b07cd1070edf9fae7091fdc1e01f6a0d421e67.exe
Resource
win10v2004-20241007-en
General
-
Target
85ca9458d96c34a7f5dc730658b07cd1070edf9fae7091fdc1e01f6a0d421e67.exe
-
Size
7KB
-
MD5
564e8e0fc5453bffe861244dbeb25408
-
SHA1
6de76541325cc33dd80286552f5b6c3cf9de47fe
-
SHA256
85ca9458d96c34a7f5dc730658b07cd1070edf9fae7091fdc1e01f6a0d421e67
-
SHA512
0733a0faf018b32eee45406aa0cbbab55990ca4246bc160802a187b67cf9312cad2a21e097ab2b79af9337974b80b657a1597942f517fb62555feedfe649a1f2
-
SSDEEP
96:MzsFTArpO6WVlj8XlSi3W3yYUZvcaNGNkHzt59hMYWa9wULbYwArV+DtX33+U:TFTA8d8kiDKCTbjW8wULba+D9H+
Malware Config
Extracted
metasploit
windows/download_exec
http://47.236.37.45:50065/Z4bl
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0)
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Cobaltstrike family
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
resource yara_rule behavioral1/memory/2344-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2344-4-0x0000000000400000-0x000000000040C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85ca9458d96c34a7f5dc730658b07cd1070edf9fae7091fdc1e01f6a0d421e67.exe