Behavioral task
behavioral1
Sample
6dcf320e47efdce4681995420ae6a509c3bfaff452100a490e79e90d5e5717a0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6dcf320e47efdce4681995420ae6a509c3bfaff452100a490e79e90d5e5717a0.exe
Resource
win10v2004-20220812-en
General
-
Target
6dcf320e47efdce4681995420ae6a509c3bfaff452100a490e79e90d5e5717a0
-
Size
232KB
-
MD5
4c5e4912d34a2d00a84f205dbdd903c0
-
SHA1
39d7fa1b81c6a04002d90624ffe167cbde8b9308
-
SHA256
6dcf320e47efdce4681995420ae6a509c3bfaff452100a490e79e90d5e5717a0
-
SHA512
5d729c8310829e765e3d70f82c082d180a5d9bd8b206d6309b4e75e1bcbb93ffda8f42dd064784e73eb0431d2113328cc8f277218b1700bda9e4aa4649fa6019
-
SSDEEP
6144:DCSK7Wbg5BhYEZ6m2NO2Q5gfzDVlVXgZ:DCSQWqxZv2o5GpX
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
192.168.1.111:443
Signatures
-
Metasploit family
Files
-
6dcf320e47efdce4681995420ae6a509c3bfaff452100a490e79e90d5e5717a0.exe windows x86
6e7418bff89b965780aa0565e3e2b094
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExW
RegCreateKeyW
RegCloseKey
RegOpenKeyExW
IsTextUnicode
RegSetValueExW
kernel32
LocalReAlloc
UnmapViewOfFile
FindNLSString
GlobalAlloc
GetLocalTime
GetDateFormatW
GetTimeFormatW
GlobalLock
GlobalUnlock
GetUserDefaultUILanguage
MultiByteToWideChar
MapViewOfFile
CreateFileMappingW
GetFileInformationByHandle
SetEndOfFile
DeleteFileW
GetACP
WriteFile
SetLastError
WideCharToMultiByte
GetLastError
LocalSize
GetFullPathNameW
FoldStringW
LocalUnlock
LocalLock
FormatMessageW
FindClose
FindFirstFileW
lstrcmpW
GetCurrentProcessId
HeapSetInformation
GetCommandLineW
GetModuleHandleExW
GetTickCount64
lstrlenW
MulDiv
GetLocaleInfoW
CreateThread
FreeLibraryAndExitThread
GetModuleFileNameW
Sleep
GetProcessHeap
HeapFree
LoadLibraryExW
HeapAlloc
FreeLibrary
GetTickCount
GlobalFree
LocalAlloc
CloseHandle
ReadFile
CreateFileW
SetErrorMode
GetSystemTimeAsFileTime
lstrcmpiW
LocalFree
InterlockedDecrement
InterlockedIncrement
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetModuleHandleA
QueryPerformanceCounter
GetCurrentThreadId
GetProcAddress
gdi32
CreateDCW
StartPage
StartDocW
SetAbortProc
DeleteDC
EndDoc
AbortDoc
EndPage
GetTextMetricsW
SetBkMode
LPtoDP
SetWindowExtEx
SetViewportExtEx
SetMapMode
GetTextExtentPoint32W
TextOutW
EnumFontsW
GetTextFaceW
SelectObject
DeleteObject
CreateFontIndirectW
GetDeviceCaps
user32
GetSystemMenu
LoadAcceleratorsW
SetWindowLongW
RegisterWindowMessageW
LoadCursorW
CreateWindowExW
SetWindowPlacement
LoadImageW
RegisterClassExW
SetScrollPos
InvalidateRect
UpdateWindow
GetWindowTextLengthW
GetWindowLongW
PeekMessageW
GetWindowTextW
EnableWindow
CreateDialogParamW
DrawTextExW
CharUpperW
GetWindowPlacement
GetParent
ChildWindowFromPoint
ScreenToClient
GetCursorPos
WinHelpW
GetDlgCtrlID
SendDlgItemMessageW
EndDialog
GetDlgItemTextW
SetDlgItemTextW
CloseClipboard
IsClipboardFormatAvailable
OpenClipboard
GetMenuState
SetWindowTextW
UnhookWinEvent
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
IsDialogMessageW
GetMessageW
SetWinEventHook
CharNextW
GetKeyboardLayout
GetForegroundWindow
MessageBeep
PostQuitMessage
IsIconic
DefWindowProcW
LoadStringW
SetActiveWindow
SetCursor
ReleaseDC
GetDC
ShowWindow
GetClientRect
CheckMenuItem
MessageBoxW
GetFocus
LoadIconW
DialogBoxParamW
SetFocus
GetSubMenu
EnableMenuItem
GetMenu
PostMessageW
MoveWindow
SendMessageW
DestroyWindow
msvcrt
_wtol
strchr
memcmp
memcpy
iswctype
_XcptFilter
_acmdln
_vsnwprintf
_except_handler4_common
_controlfp
?terminate@@YAXXZ
memset
_initterm
__setusermatherr
_ismbblead
__p__fmode
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
__p__commode
comdlg32
GetSaveFileNameW
FindTextW
PageSetupDlgW
ChooseFontW
GetFileTitleW
PrintDlgExW
GetOpenFileNameW
CommDlgExtendedError
ReplaceTextW
shell32
DragQueryFileW
DragAcceptFiles
ShellAboutW
SHCreateItemFromParsingName
DragFinish
SHAddToRecentDocs
winspool.drv
GetPrinterDriverW
ClosePrinter
OpenPrinterW
ole32
CoTaskMemAlloc
CoCreateInstance
CoInitializeEx
CoUninitialize
CoTaskMemFree
shlwapi
SHStrDupW
PathIsFileSpecW
comctl32
CreateStatusWindowW
ord345
oleaut32
SysFreeString
SysAllocString
ntdll
WinSqmAddToStream
Sections
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
vUAE Size: 4KB - Virtual size:
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ