Behavioral task
behavioral1
Sample
we.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
we.exe
Resource
win10v2004-20230915-en
General
-
Target
we.exe
-
Size
7KB
-
MD5
51cbeee04cdbfcd370b3570bb59dd566
-
SHA1
9e6d84b2449d8344ea8f07577c4cd53123c6a80a
-
SHA256
12d2a344fccb0cafc6740cbec93ee3d169a15efbcb69045cafb52c36ae37a9d4
-
SHA512
3e5f92287b4974759b58cad5c96707f7a01cd05d0fc4fd591d70ebcb262f055ec7b21fb20a153325ea23212f9c2912af40e89904890c562724b0fe606ab70fa6
-
SSDEEP
24:eFGStrJ9u0/6y7nZdkBQAVKHacfYKZqP0eNDMSCvOXpmB:is0/nkBQvHRwqSD9C2kB
Malware Config
Extracted
metasploit
metasploit_stager
154.124.62.110:443
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource we.exe
Files
-
we.exe.exe windows:4 windows x64
b4c6fff030479aa3b12625be67bf4914
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualAlloc
ExitProcess
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdmk Size: 1024B - Virtual size: 632B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE