notepad.pdb
Behavioral task
behavioral1
Sample
c93910831d7f4f4c05b27ced822116e2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c93910831d7f4f4c05b27ced822116e2.exe
Resource
win10v2004-20240226-en
General
-
Target
c93910831d7f4f4c05b27ced822116e2
-
Size
189KB
-
MD5
c93910831d7f4f4c05b27ced822116e2
-
SHA1
1d8de64bba0776f79b433242cc399c8719dbaa28
-
SHA256
f4b87b0257e63c0d307570d3de6f5220c64c12b3f3528c1872db8f76345dfe9a
-
SHA512
9c84fb3234a9d5e9a19950df5679d5efd6b876d2263d686a68870056f41ccfb069edfd379bfd0927c9d63d37a066112b2638e6a9b4f60449660dc0fb9b72ead1
-
SSDEEP
3072:elIWKvDw4fRvKoTN6p0frxJLgf7nDVF6PUp1Yo3ICgx:elI/vDwkcNpex5gfzDVlVXg
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
192.168.202.134:4321
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c93910831d7f4f4c05b27ced822116e2
Files
-
c93910831d7f4f4c05b27ced822116e2.exe windows:6 windows x64 arch:x64
38934ee4aaaaa8dab7c73508bc6715ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegSetValueExW
RegQueryValueExW
RegCreateKeyW
RegCloseKey
RegOpenKeyExW
IsTextUnicode
CloseServiceHandle
OpenSCManagerW
OpenServiceW
QueryServiceConfigW
kernel32
GetLocalTime
GetDateFormatW
GetTimeFormatW
GlobalLock
GlobalUnlock
GetUserDefaultUILanguage
HeapAlloc
GetCurrentProcess
HeapFree
GlobalAlloc
LoadLibraryW
Wow64DisableWow64FsRedirection
lstrcmpW
Wow64RevertWow64FsRedirection
GetFileAttributesW
GetModuleFileNameW
FreeLibraryAndExitThread
IsWow64Process
CreateThread
FindNLSString
UnmapViewOfFile
LocalReAlloc
MultiByteToWideChar
MapViewOfFile
CreateFileMappingW
GetFileInformationByHandle
SetEndOfFile
DeleteFileW
GetACP
WriteFile
SetLastError
WideCharToMultiByte
GetLastError
LocalSize
GetFullPathNameW
FoldStringW
LocalUnlock
LocalLock
FormatMessageW
FindClose
ReadFile
FindFirstFileW
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
GetCurrentProcessId
HeapSetInformation
GetCommandLineW
lstrlenW
MulDiv
GetLocaleInfoW
GlobalFree
LocalAlloc
QueryPerformanceCounter
GetVersionExW
CloseHandle
GetModuleHandleW
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
CreateFileW
SetErrorMode
lstrcmpiW
LocalFree
GetProcessHeap
UnhandledExceptionFilter
gdi32
StartPage
StartDocW
SetAbortProc
DeleteDC
EndDoc
AbortDoc
EndPage
GetTextMetricsW
SetBkMode
LPtoDP
SetWindowExtEx
SetViewportExtEx
SetMapMode
GetTextExtentPoint32W
TextOutW
EnumFontsW
GetTextFaceW
SelectObject
DeleteObject
CreateFontIndirectW
GetDeviceCaps
CreateDCW
user32
GetDlgItemTextW
EndDialog
SendDlgItemMessageW
GetDlgCtrlID
WinHelpW
GetCursorPos
ScreenToClient
ChildWindowFromPoint
GetParent
GetWindowPlacement
CharUpperW
GetSystemMenu
LoadAcceleratorsW
SetWindowLongW
RegisterWindowMessageW
LoadCursorW
CreateWindowExW
SetWindowPlacement
LoadImageW
RegisterClassExW
SetScrollPos
InvalidateRect
UpdateWindow
GetWindowTextLengthW
GetWindowLongW
PeekMessageW
SetDlgItemTextW
EnableWindow
CreateDialogParamW
DrawTextExW
GetSystemMetrics
SetWindowPos
GetAncestor
FindWindowW
SetForegroundWindow
OpenClipboard
GetMenuState
SetWindowTextW
UnhookWinEvent
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
IsDialogMessageW
GetMessageW
SetWinEventHook
CharNextW
GetKeyboardLayout
GetForegroundWindow
MessageBeep
DestroyWindow
PostQuitMessage
IsIconic
DefWindowProcW
CloseClipboard
GetWindowTextW
IsClipboardFormatAvailable
LoadStringW
SetActiveWindow
SetCursor
ReleaseDC
GetDC
ShowWindow
CheckMenuItem
MessageBoxW
GetFocus
LoadIconW
DialogBoxParamW
SetFocus
GetSubMenu
EnableMenuItem
GetMenu
PostMessageW
MoveWindow
SendMessageW
GetClientRect
msvcrt
memset
_vsnwprintf
_wtol
iswctype
wcsrchr
wcsncmp
__getmainargs
__set_app_type
_fmode
_commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_cexit
__C_specific_handler
_XcptFilter
_exit
_ismbblead
?terminate@@YAXXZ
memcpy
comdlg32
CommDlgExtendedError
GetSaveFileNameW
ReplaceTextW
FindTextW
PageSetupDlgW
ChooseFontW
GetFileTitleW
PrintDlgExW
GetOpenFileNameW
shell32
SHGetFolderPathW
ShellExecuteExW
DragFinish
SHCreateItemFromParsingName
ShellAboutW
DragQueryFileW
SHAddToRecentDocs
DragAcceptFiles
winspool.drv
GetPrinterDriverW
ClosePrinter
OpenPrinterW
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
shlwapi
PathIsFileSpecW
SHStrDupW
comctl32
CreatePropertySheetPageW
PropertySheetW
CreateStatusWindowW
ord345
oleaut32
SysFreeString
SysAllocString
ntdll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlInitUnicodeString
NtQueryLicenseValue
WinSqmIncrementDWORD
WinSqmAddToStream
version
VerQueryValueW
GetFileVersionInfoExW
GetFileVersionInfoSizeExW
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 184B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ