Behavioral task
behavioral1
Sample
45ff65377f2e4f0dae3a3c0d49364102.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
45ff65377f2e4f0dae3a3c0d49364102.exe
Resource
win10v2004-20231222-en
General
-
Target
45ff65377f2e4f0dae3a3c0d49364102
-
Size
160KB
-
MD5
45ff65377f2e4f0dae3a3c0d49364102
-
SHA1
67f50555a5f4f355d7df44949fdcaf43be869d59
-
SHA256
f053093d38b9681e4f80eb300afb5f48a22e26fafe6454709b862f72984c763b
-
SHA512
aa4e81457631e0fe9f2accdd2391ffe1f5e4e499d95f2e5592d3676f1cf3a0e0586549669319a0795b42fafd7398b5a20b3e0e76612e5b4340d0f5a2da1e8278
-
SSDEEP
3072:Zb55PrDvjFOEpQmdJpWI7wXhzXeftBdXBdLCu4R367uPlDKw:ZbDj1dJpF7wXhzOpXBdL9O367Y+
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45ff65377f2e4f0dae3a3c0d49364102
Files
-
45ff65377f2e4f0dae3a3c0d49364102.exe windows:4 windows x86 arch:x86
709c92fb1b0d51e4048409976b042040
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SysAllocString
VariantClear
VariantCopy
SysStringByteLen
SysFreeString
user32
CharUpperW
CharPrevA
CharUpperA
CharNextA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
memset
wcsncmp
wcslen
memcpy
fputc
fflush
fgetc
fclose
_iob
free
malloc
memmove
memcmp
fprintf
strlen
fputs
_purecall
__CxxFrameHandler
_CxxThrowException
_isatty
_fileno
kernel32
VirtualAlloc
GetTickCount
VirtualFree
WaitForSingleObject
SetEvent
InitializeCriticalSection
MapViewOfFile
GetProcessTimes
UnmapViewOfFile
OpenEventA
GetSystemTime
SystemTimeToFileTime
FileTimeToDosDateTime
GetModuleHandleA
GlobalMemoryStatus
GetSystemInfo
FileTimeToSystemTime
CompareFileTime
GetProcAddress
GetCurrentProcess
SetEndOfFile
WriteFile
ReadFile
DeviceIoControl
SetFilePointer
GetFileSize
CreateFileA
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
GetTempFileNameW
GetTempFileNameA
GetTempPathW
GetTempPathA
SearchPathW
SearchPathA
GetCurrentDirectoryW
SetCurrentDirectoryW
SetConsoleCtrlHandler
FileTimeToLocalFileTime
GetCommandLineW
SetFileApisToOEM
GetVersionExA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleMode
SetConsoleMode
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FreeLibrary
LoadLibraryExA
LoadLibraryA
AreFileApisANSI
SetCurrentDirectoryA
GetModuleFileNameA
LocalFree
FormatMessageA
FormatMessageW
GetWindowsDirectoryA
GetWindowsDirectoryW
CloseHandle
SetFileTime
CreateFileW
SetLastError
SetFileAttributesA
RemoveDirectoryA
MoveFileA
SetFileAttributesW
RemoveDirectoryW
MoveFileW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
lstrlenA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
OpenFileMappingA
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ