Analysis
-
max time kernel
110s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 15:14
Behavioral task
behavioral1
Sample
08ffafa17eb22ef7cc5c0d53bca3e635c2db18a0f1e0dde139930702a093c86aN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
08ffafa17eb22ef7cc5c0d53bca3e635c2db18a0f1e0dde139930702a093c86aN.exe
Resource
win10v2004-20241007-en
General
-
Target
08ffafa17eb22ef7cc5c0d53bca3e635c2db18a0f1e0dde139930702a093c86aN.exe
-
Size
189KB
-
MD5
63f5ec96b6ed62519a94fb7ef9ae63c0
-
SHA1
e550d810b775cf7942247051f2c7e6d257727295
-
SHA256
08ffafa17eb22ef7cc5c0d53bca3e635c2db18a0f1e0dde139930702a093c86a
-
SHA512
355374750a0a53322c5385a835b40c3ab51ef5b60054c8ac639e7857e3014cb86cbf9eda2dcfc1b080a4e55a42673b9e523c87ab36635176f466f454c73058f6
-
SSDEEP
3072:AV12yaqWRMg6XRB7k3nAietmIrHO0w36/CNor0KeQun086dAHXhaafMzD:AXNavyTXb7qetmOu0w4M2peQun086QXS
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
10.25.35.45:3355
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08ffafa17eb22ef7cc5c0d53bca3e635c2db18a0f1e0dde139930702a093c86aN.exe