Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 05:15
Behavioral task
behavioral1
Sample
ec34977344bded135083b97756df058d33565bb80a1ab48cccb82999a6b340cf.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ec34977344bded135083b97756df058d33565bb80a1ab48cccb82999a6b340cf.exe
Resource
win10v2004-20241007-en
General
-
Target
ec34977344bded135083b97756df058d33565bb80a1ab48cccb82999a6b340cf.exe
-
Size
72KB
-
MD5
ef397426691bc35566bc401598e10d60
-
SHA1
40ac43354d2ea80706dae6a60ce5cb668ba35514
-
SHA256
ec34977344bded135083b97756df058d33565bb80a1ab48cccb82999a6b340cf
-
SHA512
023009d6a0b923d582a84a6db93b4b4a5c8017ef2217937490e83df801c56b12a962ba88ec4f28bb1fc2aee7ad393d8c93bd097e27b969f061876ac85339e746
-
SSDEEP
1536:IHzUocxDi3rjpHjuNwsnW//qJsUuRhbNZkegkMb+KR0Nc8QsJq39:CzUocpqrjpD/Uu/q1u/b3kede0Nc8Qss
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.1.13:5555
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec34977344bded135083b97756df058d33565bb80a1ab48cccb82999a6b340cf.exe