Behavioral task
behavioral1
Sample
CPPDolphinInfected.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
CPPDolphinInfected.exe
Resource
win10v2004-20230220-en
General
-
Target
CPPDolphinInfected.exe
-
Size
19KB
-
MD5
4ce3b992cf4c0a9442f3d6dd11a7ba74
-
SHA1
214362cf5aa3e9290afcfd0a57da3f06975d9822
-
SHA256
1d75b097f3e88565dee5b582f1262f8500fd13c873eb23db1ab51dd7b4d46ea6
-
SHA512
f40f58380425a8183f5eac99a4e5ac1981c87e10c8efb95f83dfc4c4ea229202f1d13162634d75b592fd83573e159baf3f39b954b7141946534d5dbf082ebadd
-
SSDEEP
384:eNmKf3YVtZDfquQuHjgtocs/8j6+CRq7GkTeUe44W8:mx3aHjvcs/Sd7GjUaW8
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.0.5:4444
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource CPPDolphinInfected.exe
Files
-
CPPDolphinInfected.exe.exe windows x86
bb812554cc389e22275d612e1f7f8f75
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
msvcp140
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?_Xlength_error@std@@YAXPBD@Z
?uncaught_exception@std@@YA_NXZ
?_Init@locale@std@@CAPAV_Locimp@12@_N@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
ws2_32
gethostbyname
closesocket
WSACleanup
connect
WSAStartup
send
recv
htons
socket
vcruntime140
_CxxThrowException
__current_exception
__current_exception_context
__std_terminate
_except_handler4_common
__std_exception_destroy
__CxxFrameHandler3
memcpy
memset
memmove
__std_exception_copy
api-ms-win-crt-heap-l1-1-0
_callnewh
free
malloc
_set_new_mode
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
__p___argv
_crt_atexit
_controlfp_s
terminate
__p___argc
_cexit
_exit
_c_exit
exit
_invalid_parameter_noinfo_noreturn
system
_initterm_e
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
_register_thread_local_exe_atexit_callback
_set_app_type
_register_onexit_function
_seh_filter_exe
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
kernel32
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
GetCurrentProcess
IsProcessorFeaturePresent
LoadLibraryA
GetProcAddress
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 680B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE