Behavioral task
behavioral1
Sample
53e53c3f237759b10533102f4079fb98.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53e53c3f237759b10533102f4079fb98.exe
Resource
win10v2004-20231215-en
General
-
Target
53e53c3f237759b10533102f4079fb98
-
Size
56KB
-
MD5
53e53c3f237759b10533102f4079fb98
-
SHA1
a5030cd74a0d4d5d9cfe32f843a08db484545951
-
SHA256
86327ff0508d589659a06867311962d853114f4c9868a17ebb91755f29d5e2e8
-
SHA512
77c2542c6b92e22c9fcd4ccb437a0265b764dc04dbf5b10858812f6dbfddb06b8246c4c9921be15c44ffa23c709957244fc4f7c8fb434911001a48720416fc2f
-
SSDEEP
1536:eO0O9Ebs2DASpoaNH7wxpU41o3ewrOlAh:nUsgoaNHk7q3eX0
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53e53c3f237759b10533102f4079fb98
Files
-
53e53c3f237759b10533102f4079fb98.exe windows:4 windows x86 arch:x86
fa5fba960479120aadb511e735d55983
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
WaitForSingleObject
OutputDebugStringA
GetSystemDirectoryA
SetSystemTime
GetSystemTime
CreateProcessA
GetFileSize
FreeLibrary
LoadLibraryA
HeapFree
ReadFile
HeapAlloc
GetProcessHeap
GetLastError
CreateFileW
MultiByteToWideChar
GetCurrentProcess
TerminateProcess
Module32First
OpenProcess
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
CreateThread
SetEvent
WinExec
GetTempPathA
CreateEventA
OpenEventA
GetCommandLineA
lstrcmpA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetFilePointer
TransactNamedPipe
FindClose
FindNextFileA
FindFirstFileA
GetDriveTypeA
GetLogicalDriveStringsA
GetStartupInfoA
ExitProcess
GetModuleHandleA
GetProcAddress
WriteFile
Sleep
lstrcpyA
DeleteFileA
lstrlenA
lstrcpynA
lstrcatA
CreateFileA
DeviceIoControl
FlushFileBuffers
CopyFileA
SetFileAttributesA
CloseHandle
GetModuleFileNameA
GetTickCount
mpr
WNetAddConnection2A
WNetCancelConnection2A
ws2_32
__WSAFDIsSet
connect
select
WSAGetLastError
recv
closesocket
send
htons
inet_addr
WSAStartup
WSACleanup
gethostname
gethostbyname
inet_ntoa
listen
accept
bind
socket
iphlpapi
SendARP
rpcrt4
UuidToStringA
UuidFromStringA
user32
wsprintfA
wvsprintfA
IsCharAlphaNumericA
ShowWindow
FindWindowA
SendMessageA
advapi32
CloseServiceHandle
ControlService
OpenServiceA
OpenSCManagerA
ChangeServiceConfigA
StartServiceA
DeleteService
ChangeServiceConfig2A
CreateServiceA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegSetValueExA
RegCreateKeyA
QueryServiceStatus
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE