Behavioral task
behavioral1
Sample
0e9d5106b57057d642a47dbc55b26afe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e9d5106b57057d642a47dbc55b26afe.exe
Resource
win10v2004-20231215-en
General
-
Target
0e9d5106b57057d642a47dbc55b26afe
-
Size
60KB
-
MD5
0e9d5106b57057d642a47dbc55b26afe
-
SHA1
556140c90fad583a8eba77e2fd8f141077de192b
-
SHA256
dc2cfc784dce6b269708175f24988444aded21905f0eb7428a0dcddca65f1ac6
-
SHA512
f31d1a0af83f583d3d6269a28d0efcb1f165b283a6c3fd59f5544a6ec159b16df75e13219718edb68a65fcc2076e93be8edf84e26c9e5930246b41e5907b8ee4
-
SSDEEP
768:SgBBY4hD+PXRDn9IhUVKnThJEljKMZIOrnToIf1ZU+PxnC1w6udvE1:HDChpVKnNWKUIOrnToIffTd0
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.0.100:4444
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e9d5106b57057d642a47dbc55b26afe
Files
-
0e9d5106b57057d642a47dbc55b26afe.exe windows:4 windows x86 arch:x86
63bc027337968506d190fc50d723bc57
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
CreatePropertySheetPageA
PropertySheetA
kernel32
DeleteFileA
GetPrivateProfileIntA
GetPrivateProfileStringA
ResumeThread
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
CreateProcessA
GetModuleFileNameA
RemoveDirectoryA
GetFileSize
GetModuleHandleA
GetTempPathA
CreateDirectoryA
GetFileAttributesA
MapViewOfFile
CreateFileMappingA
CloseHandle
SetFileTime
GetStartupInfoA
DosDateTimeToFileTime
GetLastError
CreateFileA
FreeLibrary
SetLastError
FormatMessageA
LocalFree
MultiByteToWideChar
LoadLibraryA
GetProcAddress
lstrlenA
GetTempFileNameA
UnmapViewOfFile
user32
MoveWindow
GetFocus
SendMessageA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
LoadCursorA
SetCursor
PeekMessageA
TranslateMessage
DispatchMessageA
GetDlgItem
GetWindowRect
MessageBoxA
GetDC
ReleaseDC
SendDlgItemMessageA
GetParent
wsprintfA
SetDlgItemTextA
PostMessageA
DefWindowProcA
BeginPaint
GetSystemMetrics
EndPaint
gdi32
DeleteObject
TextOutA
SetBkMode
SelectObject
CreateFontA
CreateDIBitmap
CreateSolidBrush
SetTextColor
advapi32
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegEnumKeyExA
RegQueryValueA
RegCloseKey
ole32
CoCreateInstance
CoUninitialize
CoInitialize
msvcr71
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
_onexit
_controlfp
_strnicmp
_strcmpi
_strdup
_tempnam
_close
_read
_except_handler3
__p___argc
__p___argv
_open
strncmp
strchr
memcpy
memset
strncat
strcat
strlen
strcpy
strcmp
strrchr
fprintf
_vsnprintf
malloc
_snprintf
strncpy
free
sscanf
_putenv
remove
fread
ftell
fseek
fopen
fclose
fflush
_iob
freopen
fwrite
strftime
localtime
time
sprintf
_fstat
strtol
_pctype
_isctype
__mb_cur_max
qsort
realloc
fgets
Sections
.text Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ