Behavioral task
behavioral1
Sample
5d379051be098f422fe9b2a9463ad2dd870bcde8dc1dfa199a96d70fe9b0e727.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5d379051be098f422fe9b2a9463ad2dd870bcde8dc1dfa199a96d70fe9b0e727.exe
Resource
win10v2004-20221111-en
General
-
Target
5d379051be098f422fe9b2a9463ad2dd870bcde8dc1dfa199a96d70fe9b0e727
-
Size
288KB
-
MD5
12ad23c1aad7608d7547824e92ed7d05
-
SHA1
56fd38a47e5dd6cf9d88401782adc5a7617e9de4
-
SHA256
5d379051be098f422fe9b2a9463ad2dd870bcde8dc1dfa199a96d70fe9b0e727
-
SHA512
a85ff0dfd667f7737772bb959bde7488792e2cf66ff111226e05b81e87b9877be6d0579d2e2b68046c6de4937f5ed72ac1e34d46b042090ad18ecbe8257bc9c0
-
SSDEEP
6144:cteOAyw6c+J5cAiuhAXwPp9HFDHyy67cK:chi+v+XWfjyy6
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
109.239.212.182:443
Signatures
-
Metasploit family
Files
-
5d379051be098f422fe9b2a9463ad2dd870bcde8dc1dfa199a96d70fe9b0e727.exe windows x86
205fcd40c9562970436b9e64ad20e789
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyA
comctl32
ord14
ord15
ord17
ord13
comdlg32
GetOpenFileNameA
ChooseFontA
ChooseColorA
GetSaveFileNameA
gdi32
CreateBitmap
IntersectClipRect
ExcludeClipRect
UpdateColors
DeleteDC
GetTextExtentPoint32A
CreateCompatibleDC
DeleteObject
TextOutA
SetBkColor
SetTextColor
Rectangle
CreateSolidBrush
GetStockObject
SelectObject
CreateFontIndirectA
GetTextExtentExPointA
SetMapMode
GetDeviceCaps
RealizePalette
SelectPalette
CreatePalette
ExtTextOutA
GetCharacterPlacementW
ExtTextOutW
GetPixel
SetBkMode
SetTextAlign
CreateCompatibleBitmap
TranslateCharsetInfo
GetObjectA
GetTextMetricsA
CreateFontA
LineTo
MoveToEx
CreatePen
SetPixel
Polyline
GetCharWidthW
GetCharWidth32W
GetCharWidthA
GetCharWidth32A
SetPaletteEntries
UnrealizeObject
imm32
ImmReleaseContext
ImmGetCompositionStringW
ImmSetCompositionFontA
ImmGetContext
ImmSetCompositionWindow
shell32
ShellExecuteA
user32
DestroyCaret
HideCaret
ShowCaret
CreateCaret
IsWindow
MsgWaitForMultipleObjects
PeekMessageA
TranslateMessage
GetForegroundWindow
SetForegroundWindow
CreateMenu
GetDoubleClickTime
WinHelpA
MessageBoxIndirectA
UpdateWindow
EnableMenuItem
DefWindowProcA
InvalidateRect
SetWindowPos
EndPaint
GetWindowTextA
GetWindowTextLengthA
GetClientRect
BeginPaint
SetWindowTextA
GetCursorPos
TrackPopupMenu
GetKeyboardLayout
SetKeyboardState
ToAsciiEx
SetScrollInfo
GetMessageTime
PostMessageA
GetSystemMenu
CheckMenuItem
IsZoomed
FlashWindow
GetClipboardData
RegisterClipboardFormatA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
SetCaretPos
SetTimer
GetKeyboardState
SetClassLongA
SetCursor
ShowCursor
CreatePopupMenu
InsertMenuA
DeleteMenu
AppendMenuA
IsIconic
GetSystemMetrics
GetCapture
ReleaseCapture
LoadIconA
GetDesktopWindow
MoveWindow
DefDlgProcA
LoadCursorA
CreateDialogParamA
GetMessageA
GetWindowLongA
IsDialogMessageA
DispatchMessageA
PostQuitMessage
EnableWindow
DialogBoxParamA
EndDialog
GetParent
SetActiveWindow
GetWindowPlacement
SetWindowPlacement
RegisterWindowMessageA
DrawEdge
SetCapture
MessageBoxA
SetFocus
GetDlgItem
GetDlgItemTextA
SetDlgItemTextA
CheckDlgButton
IsDlgButtonChecked
CheckRadioButton
SetWindowLongA
MessageBeep
SendDlgItemMessageA
GetDC
ReleaseDC
SendMessageA
MapDialogRect
GetCaretBlinkTime
DestroyWindow
RegisterClassA
GetSysColor
SystemParametersInfoA
GetWindowRect
CreateWindowExA
ShowWindow
KillTimer
winmm
PlaySoundA
winspool.drv
StartDocPrinterA
WritePrinter
EndDocPrinter
ClosePrinter
EnumPrintersA
EndPagePrinter
StartPagePrinter
OpenPrinterA
kernel32
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapSize
SetEndOfFile
InterlockedExchange
RtlUnwind
SetStdHandle
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetFilePointer
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
VirtualFree
HeapCreate
HeapDestroy
LCMapStringW
LCMapStringA
GetFileType
GetStdHandle
SetHandleCount
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
GetTimeZoneInformation
FlushFileBuffers
GetStringTypeW
GetStringTypeA
GetCommandLineA
GetStartupInfoA
DeleteFileA
GetCurrentProcess
TerminateProcess
ExitProcess
HeapFree
HeapReAlloc
HeapAlloc
GetDateFormatA
GetTimeFormatA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetACP
GetLocalTime
GetEnvironmentVariableA
GetWindowsDirectoryA
SetCommBreak
CreateFileA
GetCommState
SetCommState
SetCommTimeouts
ClearCommBreak
CreatePipe
SetHandleInformation
FreeLibrary
CreateThread
WriteFile
CreateEventA
ReadFile
GetLastError
WaitForSingleObject
GetOverlappedResult
SetEvent
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetModuleFileNameA
CreateProcessA
CloseHandle
Beep
LoadLibraryA
WideCharToMultiByte
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
MultiByteToWideChar
IsDBCSLeadByteEx
GetLocaleInfoA
GetOEMCP
GetCPInfo
lstrcpynA
GetModuleHandleA
GetProcAddress
GetVersionExA
MulDiv
GetTickCount
Sections
.text Size: 200KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ