Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2025, 14:21
Behavioral task
behavioral1
Sample
anan.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
anan.pdf
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
template.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
template.exe
Resource
win10v2004-20250314-en
General
-
Target
template.exe
-
Size
72KB
-
MD5
d1ef7e603bd17a12865e6769807e4be5
-
SHA1
f5ae03a2e8b6b74d48cda18ed54ac123f0841408
-
SHA256
b124841a4e37d0b6eb550d948e5e2166ee0e07ef2c2a5ca47918c029634058da
-
SHA512
baad36cfb897e45f2ad5395285627cea5bbb939c81d964dd7c95fd9273eed262a19eb745378d9f9aff04f9013e0f571f78ffc73ef8ac900d67c20de5b00dcbeb
-
SSDEEP
1536:IMUBxUoeP7XL4isQndtz8mMb+KR0Nc8QsJq39:RT7XAQf8me0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
10.0.2.15:443
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language template.exe