Analysis
-
max time kernel
94s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
fb792235853d365b5b23f9cfbc4802da76a30d0c284f936c94c51c17c17673d9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fb792235853d365b5b23f9cfbc4802da76a30d0c284f936c94c51c17c17673d9.exe
Resource
win10v2004-20241007-en
General
-
Target
fb792235853d365b5b23f9cfbc4802da76a30d0c284f936c94c51c17c17673d9.exe
-
Size
14KB
-
MD5
a94526eb3f0a45281e4d9ffeb813dc49
-
SHA1
6fb0effcb38a5315586c0a87828139fac366af1a
-
SHA256
fb792235853d365b5b23f9cfbc4802da76a30d0c284f936c94c51c17c17673d9
-
SHA512
5c8946e6e45f7359ce9a72d3a352e74dd1387f77cf063ae2730a18e54199f019eea349c80629e0b4ac4d0f939ba599ed0490166ecdfd171ba005e9104780cf3f
-
SSDEEP
192:Z3mbPYCfMcrfOIuZmvKQxtzlSIVX6NOK9I+rdZejDMN1:gMCfrfQ6tBSIR+rzeUN1
Malware Config
Extracted
metasploit
windows/download_exec
http://192.168.1.4:80/Bw9j
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0; NP06)
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb792235853d365b5b23f9cfbc4802da76a30d0c284f936c94c51c17c17673d9.exe