Analysis
-
max time kernel
30s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 20:21
Behavioral task
behavioral1
Sample
encoded.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
encoded.exe
Resource
win10v2004-20241007-en
General
-
Target
encoded.exe
-
Size
245KB
-
MD5
0bd82c2854f9c12e335dac2c6a062620
-
SHA1
8baa9d0cd2252470049b67adc3cf372ae8ee7453
-
SHA256
bdca57410e7ff3dd50c3d5ff052a9d147bef19328c7d70b3ed0232696f010cd0
-
SHA512
724d267ca9b28f805408e271564875abf79c9baac2950471c7c4d2258f1a4b0c45052321074455589db160d88ffe0f058ec0ce16e8fdecd89b254b9d96f98521
-
SSDEEP
6144:1qGdXu6w+0Nc8Qs89Z8+LkHEgn/tt1o9P1O:9lu659b8xpn/tf8
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language encoded.exe