Behavioral task
behavioral1
Sample
06f4d461a4cf736b3ae617a869317bbc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06f4d461a4cf736b3ae617a869317bbc.exe
Resource
win10v2004-20231215-en
General
-
Target
06f4d461a4cf736b3ae617a869317bbc
-
Size
72KB
-
MD5
06f4d461a4cf736b3ae617a869317bbc
-
SHA1
5c58d96c350725b46a8081c49f0074595ba52fe2
-
SHA256
3abb2e23d70ea2e71c033893ead6843ae4679ba25bc61ada04e162bc26b45e63
-
SHA512
3a51f2e891c5237233298a9bce17cb7dc604d5bf4d4522f2fda92b43bb811dcf76c71d98adc4fe0c1f2ee98ba6f47c79b1fb8f8570de606079fbb4856e0b046b
-
SSDEEP
768:lWLxA7HNj410FqCJe+WSnDkgwTzctX+JWFTO2TJKnQhxO9BwH6eo+lOcl2KHAKqD:l9Nj4rLSnYlQtX+efs9qjomOlAh9Y
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06f4d461a4cf736b3ae617a869317bbc
Files
-
06f4d461a4cf736b3ae617a869317bbc.exe windows:4 windows x86 arch:x86
0b4daf7a5d20f5d9b0fd70b155e00ff1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
ResetEvent
WaitForSingleObject
OutputDebugStringA
SetSystemTime
GetSystemTime
CreateProcessA
FreeLibrary
LoadLibraryA
GetTempPathA
GetLastError
CreateFileW
MultiByteToWideChar
GetCurrentProcess
TerminateProcess
Module32First
OpenProcess
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
SetEvent
WinExec
GetModuleFileNameA
CreateEventA
GetSystemDirectoryA
GetCommandLineA
lstrcmpA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
TransactNamedPipe
FindClose
FindNextFileA
FindFirstFileA
GetDriveTypeA
GetLogicalDriveStringsA
GetStartupInfoA
ExitProcess
lstrcatA
GetModuleHandleA
GetProcAddress
Sleep
lstrcpyA
lstrcpynA
GetFileSize
GetProcessHeap
HeapAlloc
HeapFree
DeleteFileA
lstrlenA
CreateFileA
DeviceIoControl
ReadFile
CloseHandle
SetFilePointer
OpenEventA
WriteFile
mpr
WNetAddConnection2A
WNetCancelConnection2A
ws2_32
listen
__WSAFDIsSet
accept
WSAGetLastError
recv
closesocket
send
htons
inet_addr
WSAStartup
WSACleanup
gethostname
gethostbyname
inet_ntoa
bind
connect
socket
select
iphlpapi
SendARP
rpcrt4
UuidFromStringA
UuidToStringA
user32
IsCharAlphaNumericA
wsprintfA
ShowWindow
wvsprintfA
SendMessageA
FindWindowA
advapi32
CloseServiceHandle
ControlService
OpenServiceA
OpenSCManagerA
ChangeServiceConfigA
StartServiceA
DeleteService
ChangeServiceConfig2A
CreateServiceA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegSetValueExA
RegCreateKeyA
QueryServiceStatus
Sections
.text Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE