Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/01/2025, 15:52
Behavioral task
behavioral1
Sample
8ba24b6e0d718d11bed8d1eee5baa127f7e7c498288d813e65ae65957cea055b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ba24b6e0d718d11bed8d1eee5baa127f7e7c498288d813e65ae65957cea055b.exe
Resource
win10v2004-20241007-en
General
-
Target
8ba24b6e0d718d11bed8d1eee5baa127f7e7c498288d813e65ae65957cea055b.exe
-
Size
72KB
-
MD5
faadeb87e5595470836ceaaae05b029b
-
SHA1
faa3333c81dd13da5b8e43b956dfef3ca2c00cec
-
SHA256
8ba24b6e0d718d11bed8d1eee5baa127f7e7c498288d813e65ae65957cea055b
-
SHA512
3ecb55e9721738578a49e5aef4ca1c426ec9af7184b174eaa8a5f4b8c047ed70f749d0f1b56d23402f8fc8a068a9a2a895fc9e34eaa6d6290a54db03c595dc99
-
SSDEEP
1536:Im2b1S78e02FHnWssW8AdWaIAFpMs1i9AjMb+KR0Nc8QsJq3d:N2b1S78e02FHmb2WSPMqi9Aje0Nc8Qss
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.136.129:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ba24b6e0d718d11bed8d1eee5baa127f7e7c498288d813e65ae65957cea055b.exe