Behavioral task
behavioral1
Sample
398c7bd5c32343dbf6823e1905dac19aefe674a624cb9c8196635a89551550ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
398c7bd5c32343dbf6823e1905dac19aefe674a624cb9c8196635a89551550ef.exe
Resource
win10v2004-20220901-en
General
-
Target
398c7bd5c32343dbf6823e1905dac19aefe674a624cb9c8196635a89551550ef
-
Size
560KB
-
MD5
91a7b543084ecb866c7bae7b430a4c00
-
SHA1
e40bbb5ed45035401cd385a55cdbb34c45d32be1
-
SHA256
398c7bd5c32343dbf6823e1905dac19aefe674a624cb9c8196635a89551550ef
-
SHA512
d1cd59c39ef977da4780bbd664466e98f0a7745601248f688c4421d9c328963392e4b8a6402250390f4bc56f5835fc986587bb26898e616c49d4f10cddeaef5f
-
SSDEEP
1536:Kirl2Y0Xkw754Bg98Eq8bEdNFNM8wZsE/IJ1f56BoS4UWO0uf4AERay1:rlIXk44iYUEJp1FJ1f56H4UWO0uf4p
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
Metasploit family
Files
-
398c7bd5c32343dbf6823e1905dac19aefe674a624cb9c8196635a89551550ef.exe windows x86
df18b34b87abebe5196b2ca4a2b92426
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetUserNameA
user32
wsprintfA
CharLowerA
mpr
WNetAddConnection2A
shell32
SHChangeNotify
ShellExecuteExA
ShellExecuteA
ws2_32
send
WSACleanup
connect
sendto
htonl
WSAStartup
gethostname
gethostbyname
inet_addr
shutdown
closesocket
htons
setsockopt
gethostbyaddr
ioctlsocket
recv
socket
iphlpapi
GetAdaptersInfo
wininet
DeleteUrlCacheEntry
InternetCloseHandle
InternetReadFile
HttpSendRequestA
InternetOpenA
HttpOpenRequestA
InternetConnectA
netapi32
NetLocalGroupAddMembers
NetUserAdd
urlmon
URLDownloadToFileA
mfc42
ord823
ord2764
ord4278
ord858
ord6874
ord540
ord860
ord800
ord825
msvcrt
time
_stricmp
memcmp
fread
ftell
fclose
fseek
fopen
fwrite
printf
fprintf
fgets
__dllonexit
_onexit
_exit
_XcptFilter
__CxxFrameHandler
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
strchr
strrchr
strcpy
_except_handler3
strcmp
strstr
_snprintf
ceil
strncat
_ftol
sscanf
strtok
_vsnprintf
strlen
malloc
memcpy
free
strcat
strncpy
sprintf
memset
srand
atol
exit
rand
atoi
kernel32
GetSystemDirectoryA
GetSystemInfo
CreateMutexA
SetFileAttributesA
DeleteFileA
ReleaseMutex
GetCurrentProcess
GetDriveTypeA
ExpandEnvironmentStringsA
CreateFileA
GetStartupInfoA
CreateToolhelp32Snapshot
Process32First
GetCurrentProcessId
Process32Next
lstrcpyA
QueryPerformanceFrequency
QueryPerformanceCounter
GetLogicalDriveStringsA
lstrcatA
CreateDirectoryA
lstrlenA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TransactNamedPipe
ReadFile
CreateEventA
GetShortPathNameA
GetEnvironmentVariableA
SetPriorityClass
SetThreadPriority
SetProcessPriorityBoost
CopyFileA
GetWindowsDirectoryA
GetFileTime
SetFileTime
GetFileAttributesA
TerminateThread
OpenProcess
TerminateProcess
GetCurrentThread
LocalAlloc
LocalFree
WinExec
MultiByteToWideChar
ExitThread
WriteFile
CreateProcessA
lstrcmpiA
CreateThread
Sleep
GetLastError
GetTickCount
GetTempPathA
GetLocaleInfoA
WaitForSingleObject
CloseHandle
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
ExitProcess
GetVersionExA
LoadLibraryA
Sections
.text Size: 476KB - Virtual size: 476KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE