Static task
static1
Behavioral task
behavioral1
Sample
3b664ef693e3a2ba0d802e3533665deeb5b6564b60b9df77ddf7b5238c5433b3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3b664ef693e3a2ba0d802e3533665deeb5b6564b60b9df77ddf7b5238c5433b3.exe
Resource
win10v2004-20220414-en
General
-
Target
3b664ef693e3a2ba0d802e3533665deeb5b6564b60b9df77ddf7b5238c5433b3
-
Size
3.5MB
-
MD5
5868d5f4553d09e0cec3ac99e5627a02
-
SHA1
8d770dc0933e355b02aace86e7231b4bf437af1a
-
SHA256
3b664ef693e3a2ba0d802e3533665deeb5b6564b60b9df77ddf7b5238c5433b3
-
SHA512
92769d31ef11c83c0e87307dca29d38a41a521dfb89e3ef521c7c34c78fc14b718a787417fee463bb68a10f249af5fb043a7596cb451e26d3b9b6ae81a4cfbe5
-
SSDEEP
98304:SpH/o8W1x1RSqmdEvL4526/OpH/o8W1x1RSqmdEvL452:KH/o8+30qmdEvL4vWH/o8+30qmdEvL4
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
Cobaltstrike family
-
Metasploit family
Files
-
3b664ef693e3a2ba0d802e3533665deeb5b6564b60b9df77ddf7b5238c5433b3.exe windows x86
96a86f68714e1f711aa3e35b7b5b3348
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorA
kernel32
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapSize
SetStdHandle
SetFilePointer
SetEndOfFile
GetProcessHeap
ReadFile
WriteConsoleW
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
CreateFileW
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapCreate
GetModuleFileNameW
GetStdHandle
SetLastError
TlsFree
GetModuleHandleExA
WaitForSingleObject
GetExitCodeProcess
SetDllDirectoryA
CreateProcessA
CreateDirectoryA
GetLastError
GetProcAddress
GetModuleHandleA
GetCurrentProcess
GetSystemDirectoryA
GetModuleFileNameA
GetTempPathA
LocalFree
CreateFileA
MoveFileExA
GetTickCount
GetFileAttributesA
FindFirstFileA
RemoveDirectoryA
FindClose
FindNextFileA
CloseHandle
DeleteFileA
Sleep
FormatMessageW
GetLocalTime
GetCurrentThreadId
GetCurrentProcessId
FindResourceA
LoadResource
SizeofResource
LockResource
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
FreeLibrary
GetModuleHandleExW
LoadLibraryW
InterlockedIncrement
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
ExitProcess
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetFileType
WriteFile
GetConsoleCP
GetConsoleMode
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
LoadLibraryA
Sections
.text Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ