Behavioral task
behavioral1
Sample
e3887f9d1a6a7aed7b2da234211dcd5cd8718ab8d0fb3d6de56ade7e196eb4fc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e3887f9d1a6a7aed7b2da234211dcd5cd8718ab8d0fb3d6de56ade7e196eb4fc.exe
Resource
win10v2004-20221111-en
General
-
Target
e3887f9d1a6a7aed7b2da234211dcd5cd8718ab8d0fb3d6de56ade7e196eb4fc
-
Size
94KB
-
MD5
1e00ed0986301f45fec43b7390f2fe20
-
SHA1
d8684d5f5649c6c13e7235c60732b65652024049
-
SHA256
e3887f9d1a6a7aed7b2da234211dcd5cd8718ab8d0fb3d6de56ade7e196eb4fc
-
SHA512
c249fcf2cece946e5dcfd1ac5a0f757a7f212fed4956e3a345652f09ef04bd693c9229be29fda70f5c249f207846b343b8ea52cd15df90f5d1c1084b66f03ae7
-
SSDEEP
1536:21y5PUK+LTE+vBgBEA3g/EdXcIYOEw1xNL01Zsabp0Ub:2A/+XE+JgBd3g/JIPjYZsatb
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
Metasploit family
Files
-
e3887f9d1a6a7aed7b2da234211dcd5cd8718ab8d0fb3d6de56ade7e196eb4fc.exe windows x86
27238742ee44ab99a19e3dde97d94de9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
userenv
GetUserProfileDirectoryA
kernel32
GetDriveTypeA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
CreateThread
ExitThread
ReleaseMutex
GetTickCount
GetLastError
CreateMutexA
lstrcmpA
lstrcmpiA
GetVersionExA
GetLocaleInfoA
TerminateThread
GetFileAttributesA
GetSystemDirectoryA
CopyFileA
SetFileAttributesA
WriteFile
CreateFileA
GetTempPathA
lstrcpyA
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TransactNamedPipe
GlobalUnlock
GlobalLock
GlobalAlloc
InterlockedDecrement
lstrlenA
CreateDirectoryA
ExitProcess
GetLogicalDriveStringsA
FreeLibrary
GetCurrentProcess
VirtualFreeEx
ReadProcessMemory
WriteProcessMemory
VirtualAllocEx
OpenProcess
SetEndOfFile
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
ReadFile
IsBadWritePtr
GetModuleHandleA
RaiseException
ExpandEnvironmentStringsA
CreateProcessA
Sleep
CloseHandle
WaitForSingleObject
LocalFree
lstrcatA
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
HeapSize
TerminateProcess
HeapReAlloc
GetVersion
GetCommandLineA
GetStartupInfoA
RtlUnwind
HeapAlloc
HeapFree
user32
VkKeyScanA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
SendMessageA
ShowWindow
SetFocus
SetForegroundWindow
BlockInput
keybd_event
RegisterClassExA
LoadIconA
LoadCursorA
FindWindowExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
SetTimer
FindWindowA
KillTimer
GetWindowThreadProcessId
gdi32
GetStockObject
advapi32
OpenProcessToken
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantInit
SysAllocString
SysFreeString
VariantClear
ws2_32
closesocket
recv
send
htons
ntohl
select
ioctlsocket
gethostbyaddr
socket
connect
WSACleanup
Sections
.text Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 305KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE