Behavioral task
behavioral1
Sample
b4ca17c0028b9e5d1618b4f0b30950a6a901b3904b5e40b9e766311c661a9089.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4ca17c0028b9e5d1618b4f0b30950a6a901b3904b5e40b9e766311c661a9089.exe
Resource
win10v2004-20240412-en
General
-
Target
b4ca17c0028b9e5d1618b4f0b30950a6a901b3904b5e40b9e766311c661a9089
-
Size
1.2MB
-
MD5
2243baab4fa593ac1444212612936771
-
SHA1
5d00a21b1ed291d7bf33ed3a312b7aa05ae7bae7
-
SHA256
b4ca17c0028b9e5d1618b4f0b30950a6a901b3904b5e40b9e766311c661a9089
-
SHA512
9aaf856dbf3fe35bb0f0f28cdfb7925608f71826e9537d8c674bc2d03651e96c4736bda98db613fa08d6ebf573c38dd0a3f3f3ca2014e3b3ba5d5294cf957093
-
SSDEEP
24576:sG8C4F3iQLomlee+kjUiwQLomlee+kjUi:MC4Fymlakjemlakj
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4ca17c0028b9e5d1618b4f0b30950a6a901b3904b5e40b9e766311c661a9089
Files
-
b4ca17c0028b9e5d1618b4f0b30950a6a901b3904b5e40b9e766311c661a9089.exe windows:4 windows x86 arch:x86
cad5952bdb7b48eced17c4ef1f7d97bd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
shlwapi
StrStrIW
kernel32
Sleep
DeleteCriticalSection
K32GetModuleBaseNameW
ReadProcessMemory
K32EnumProcessModules
GetTickCount
SizeofResource
GetCurrentProcess
ExpandEnvironmentStringsW
WaitForDebugEvent
InitializeCriticalSection
GetFileAttributesW
DebugActiveProcessStop
ResumeThread
ContinueDebugEvent
OpenProcess
GetLastError
LockResource
DeleteFileW
CreateThread
LoadResource
FindResourceW
DebugActiveProcess
CreateProcessW
FreeLibrary
GetExitCodeProcess
MultiByteToWideChar
FormatMessageW
SetConsoleCtrlHandler
TerminateProcess
GetFullPathNameW
WaitForMultipleObjects
GetEnvironmentVariableA
K32GetProcessImageFileNameW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
CloseHandle
GetCurrentDirectoryW
GetCurrentProcessId
SystemTimeToTzSpecificLocalTime
GetSystemTime
DebugBreak
IsDebuggerPresent
GetFileSizeEx
CreateFileW
ReleaseSemaphore
GetProcessId
GetThreadContext
SetFilePointerEx
GetTimeFormatW
ExitProcess
CreateSemaphoreW
GetDateFormatW
OpenThread
DeviceIoControl
GetCurrentThread
VirtualQueryEx
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadFile
GetConsoleOutputCP
FlushFileBuffers
ReadConsoleW
DecodePointer
SetEvent
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
GetModuleFileNameW
WaitForSingleObject
GetFileType
GetModuleHandleW
LocalFree
GetProcAddress
LocalAlloc
GetStdHandle
GetCommandLineW
LoadLibraryExW
GetVersionExW
SetLastError
CreateEventW
OpenEventW
GetStringTypeW
HeapSize
HeapReAlloc
WriteConsoleW
SetEndOfFile
GetSystemInfo
ReadConsoleInputW
SetConsoleMode
GetConsoleMode
WideCharToMultiByte
LCMapStringW
CompareStringW
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
GetConsoleCP
SetStdHandle
WriteFile
GetCommandLineA
HeapFree
LoadLibraryA
user32
SendMessageW
EndDialog
GetDlgItem
SetCursor
LoadCursorW
DialogBoxIndirectParamW
GetSysColorBrush
EnumWindows
InflateRect
wsprintfW
GetWindowThreadProcessId
IsWindowVisible
IsHungAppWindow
LoadStringA
SetWindowTextW
gdi32
StartPage
EndDoc
GetDeviceCaps
SetMapMode
StartDocW
EndPage
comdlg32
PrintDlgW
advapi32
RegDeleteValueW
CloseServiceHandle
OpenSCManagerW
EnumServicesStatusExW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegCreateKeyW
RegQueryValueExW
shell32
CommandLineToArgvW
ole32
CoInitializeEx
CoCreateInstance
CoAllowSetForegroundWindow
CLSIDFromString
CoUninitialize
pdh
PdhGetFormattedCounterValue
PdhCollectQueryData
PdhAddCounterW
PdhOpenQueryW
Sections
.text Size: 216KB - Virtual size: 216KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 416KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 416KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ