Behavioral task
behavioral1
Sample
d97b52ba57ea9c00e2af0d0b4dc69fd4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d97b52ba57ea9c00e2af0d0b4dc69fd4.exe
Resource
win10v2004-20230220-en
General
-
Target
d97b52ba57ea9c00e2af0d0b4dc69fd4
-
Size
14KB
-
MD5
d97b52ba57ea9c00e2af0d0b4dc69fd4
-
SHA1
56caad19d9e77f984b12e1b6eeda5bae3974c8f7
-
SHA256
514ab8683755ab6701881876cb294deda2ec1e30098265c042ce78a010035e73
-
SHA512
dd3900cbac67bafe8ffc308b1bb826e958990a21650f671795c8f75d1db8f6309e760fac9b82776616cea80c3ac0597f511148a56ac8b4c0406999bc4375a706
-
SSDEEP
192:N4KpzphIFl5+1tAeglA4hBt1r4GPjTEA3Q5Xf/rX7oou:CKpz4FlYiDl/r4GPjAA3i7o
Malware Config
Extracted
metasploit
metasploit_stager
192.168.211.130:4444
Signatures
-
Metasploit family
Files
-
d97b52ba57ea9c00e2af0d0b4dc69fd4.exe windows x64
b925db5912946a6edba4a01f16061298
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCurrentProcess
Thread32Next
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
CloseHandle
LoadLibraryW
GetProcAddress
GetModuleHandleW
FreeLibrary
OpenThread
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
RtlCaptureContext
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
vcruntime140
_CxxThrowException
__current_exception_context
__std_exception_copy
__std_exception_destroy
memcpy
__current_exception
memset
__C_specific_handler
memmove
api-ms-win-crt-runtime-l1-1-0
_register_onexit_function
_crt_atexit
_initialize_onexit_table
_register_thread_local_exe_atexit_callback
_exit
_c_exit
_cexit
exit
_initterm_e
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
__p___argv
_set_app_type
_seh_filter_exe
__p___argc
terminate
api-ms-win-crt-heap-l1-1-0
free
malloc
_callnewh
_set_new_mode
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ