Behavioral task
behavioral1
Sample
c205f8466becf457613f588a1d86aaa1b1bb95f5a627a1380ae9ba1baad7d268.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c205f8466becf457613f588a1d86aaa1b1bb95f5a627a1380ae9ba1baad7d268.exe
Resource
win10v2004-20220812-en
General
-
Target
c205f8466becf457613f588a1d86aaa1b1bb95f5a627a1380ae9ba1baad7d268
-
Size
126KB
-
MD5
47ef729c23fa141cf37ff04fb92bff4c
-
SHA1
a7d4d6fb5dd43bc4f09f8f028e275135536f8de2
-
SHA256
c205f8466becf457613f588a1d86aaa1b1bb95f5a627a1380ae9ba1baad7d268
-
SHA512
bc2d546eebfa0676c0940fcc8072d211ca3d34e93d0a81fbccfe1079fdbfe1c7166f6cdef257c4b715c23c4f009f5efcb05b4384d04aaae8f5af4333d8f28e5b
-
SSDEEP
768:UCxkin3KJtgIVGD1XfUh04e6Ecyegdz7nvB1OErIjb5Xs+FVjdl9T:UIk24tDVG5XfUh/eD6KzzvB1j0Fsap
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.0.128:11996
Signatures
-
Metasploit family
Files
-
c205f8466becf457613f588a1d86aaa1b1bb95f5a627a1380ae9ba1baad7d268.exe windows x64
2b45d163f5dbf249c9cefaf3a0eab0ee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
lstrcatW
lstrlenA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetProcAddress
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
GetModuleHandleA
GetModuleFileNameA
GetTickCount64
GetSystemInfo
OpenProcess
GetCurrentProcess
Sleep
CloseHandle
GetCommandLineW
GetStartupInfoW
GetCommandLineA
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
FreeLibrary
VirtualQuery
GetProcessHeap
HeapFree
HeapAlloc
GetLastError
GetCurrentThreadId
WideCharToMultiByte
MultiByteToWideChar
RaiseException
IsDebuggerPresent
GetModuleHandleW
user32
GetForegroundWindow
FindWindowA
GetWindowThreadProcessId
CharLowerBuffA
advapi32
RegGetValueA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
CreateProcessWithTokenW
LookupPrivilegeValueA
SetTokenInformation
DuplicateTokenEx
AdjustTokenPrivileges
OpenProcessToken
msvcp140d
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
??0_Lockit@std@@QEAA@H@Z
??1_Lockit@std@@QEAA@XZ
?_Xlength_error@std@@YAXPEBD@Z
?uncaught_exception@std@@YA_NXZ
?good@ios_base@std@@QEBA_NXZ
?flags@ios_base@std@@QEBAHXZ
?width@ios_base@std@@QEBA_JXZ
?width@ios_base@std@@QEAA_J_J@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ
?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ
?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
vcruntime140d
memset
memcpy
__std_exception_copy
__std_exception_destroy
_CxxThrowException
__C_specific_handler_noexcept
__C_specific_handler
__vcrt_GetModuleFileNameW
__vcrt_GetModuleHandleW
__vcrt_LoadLibraryExW
__std_type_info_destroy_list
__current_exception
__current_exception_context
memmove
vcruntime140_1d
__CxxFrameHandler4
ucrtbased
strlen
_exit
_set_fmode
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_configthreadlocale
_set_new_mode
__p__commode
_free_dbg
_initterm
_wsplitpath_s
wcscpy_s
_seh_filter_dll
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
terminate
_stricmp
strcpy
strcmp
strcpy_s
_initterm_e
_initialize_narrow_environment
_configure_narrow_argv
__setusermatherr
_set_app_type
_seh_filter_exe
__stdio_common_vsprintf_s
strcat_s
_CrtDbgReportW
malloc
_get_initial_narrow_environment
_callnewh
_mbscmp
__stdio_common_vsprintf
_CrtDbgReport
system
_wmakepath_s
__p__pgmptr
exit
_invalid_parameter
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 1024B - Virtual size: 553B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 373B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 939B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ