Behavioral task
behavioral1
Sample
ad79df78aba19d75b8a365267d298addfed3baf297ecd66232204d5179a129f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad79df78aba19d75b8a365267d298addfed3baf297ecd66232204d5179a129f5.exe
Resource
win10v2004-20220901-en
General
-
Target
ad79df78aba19d75b8a365267d298addfed3baf297ecd66232204d5179a129f5
-
Size
488KB
-
MD5
2175f42ad0883efa6fce93ca4ba40ca0
-
SHA1
2f697ce17236ae02bb01cbb028ac8fa2b2d78a6a
-
SHA256
ad79df78aba19d75b8a365267d298addfed3baf297ecd66232204d5179a129f5
-
SHA512
d01566365597ca9b882eeda9fa1089076f407253d5e6be302e3accae0b331172ceb12d1d61d59d7891c672ebf6f7fd82e7f82f1fc53d8facba5987f0be9551bd
-
SSDEEP
3072:AalJ4dMl+gQO9lj9OjFLz1hTCYuJtoWO0IUCp0a:AalJ4dMlBbAxLxhTfStoWO0IUra
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
Metasploit family
Files
-
ad79df78aba19d75b8a365267d298addfed3baf297ecd66232204d5179a129f5.exe windows x86
0145c878c580871422501e546bd4222c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetUserNameA
user32
wsprintfA
CharLowerA
mpr
WNetAddConnection2A
shell32
SHChangeNotify
ShellExecuteExA
ShellExecuteA
ws2_32
WSACleanup
connect
send
htonl
sendto
WSASocketA
WSAStartup
recv
gethostname
gethostbyname
inet_addr
shutdown
closesocket
htons
gethostbyaddr
ioctlsocket
socket
iphlpapi
GetAdaptersInfo
wininet
DeleteUrlCacheEntry
InternetCloseHandle
InternetReadFile
HttpSendRequestA
InternetOpenA
HttpOpenRequestA
InternetConnectA
netapi32
NetLocalGroupAddMembers
NetUserAdd
urlmon
URLDownloadToFileA
mfc42
ord823
ord2764
ord4278
ord858
ord6874
ord540
ord860
ord800
ord825
msvcrt
ceil
__CxxFrameHandler
time
_stricmp
memcmp
fread
ftell
fclose
fseek
fopen
fwrite
printf
fprintf
fgets
__dllonexit
_onexit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
strcpy
_except_handler3
strcmp
strstr
_snprintf
strncat
_ftol
sscanf
strtok
_vsnprintf
strlen
malloc
memcpy
free
strcat
strncpy
sprintf
atoi
strrchr
atol
rand
memset
_exit
strchr
srand
kernel32
CreateMutexA
SetFileAttributesA
DeleteFileA
ReleaseMutex
GetCurrentProcess
GetDriveTypeA
ExpandEnvironmentStringsA
CreateFileA
ExitThread
WriteFile
GetStartupInfoA
CreateToolhelp32Snapshot
Process32First
GetCurrentProcessId
Process32Next
lstrcpyA
QueryPerformanceFrequency
QueryPerformanceCounter
GetLogicalDriveStringsA
lstrcatA
CreateDirectoryA
lstrlenA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TransactNamedPipe
ReadFile
CreateEventA
GetShortPathNameA
GetEnvironmentVariableA
SetPriorityClass
SetThreadPriority
SetProcessPriorityBoost
CopyFileA
GetWindowsDirectoryA
GetFileTime
SetFileTime
GetFileAttributesA
TerminateThread
OpenProcess
TerminateProcess
GetCurrentThread
LocalAlloc
LocalFree
WinExec
MultiByteToWideChar
LoadLibraryA
CreateProcessA
lstrcmpiA
CreateThread
Sleep
GetLastError
GetTickCount
GetTempPathA
GetLocaleInfoA
WaitForSingleObject
CloseHandle
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
ExitProcess
GetVersionExA
GetSystemDirectoryA
Sections
.text Size: 468KB - Virtual size: 468KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE