Analysis
-
max time kernel
119s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 10:55
Behavioral task
behavioral1
Sample
ba83ff8c0967e78043c19cd66b94074407aa32a1d650def38935c45d322098b9.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ba83ff8c0967e78043c19cd66b94074407aa32a1d650def38935c45d322098b9.exe
Resource
win10v2004-20241007-en
General
-
Target
ba83ff8c0967e78043c19cd66b94074407aa32a1d650def38935c45d322098b9.exe
-
Size
72KB
-
MD5
fd3211b0d9b64ffe0c229c1fe9f8ea33
-
SHA1
d572bb714ae772724d7c092bdb6a8a6121c4d192
-
SHA256
ba83ff8c0967e78043c19cd66b94074407aa32a1d650def38935c45d322098b9
-
SHA512
0998c18833f24c587a21e09eb54c802d1ed065a39fc4e8cbb794c85e9d2075a42cdfb647a05950c3d7422f627a5476cb087bf37d150172f7b7cd7a50c75237dc
-
SSDEEP
1536:IvvNbOHIwU3n9ReIe8Mb+KR0Nc8QsJq3V:gxOHIwc94Qe0Nc8QsCV
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.101.204:6666
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba83ff8c0967e78043c19cd66b94074407aa32a1d650def38935c45d322098b9.exe