Behavioral task
behavioral1
Sample
06a1a9932b3b6c974313e744f7991d3245b8fa8dae5535cba63bc8b2d1cdbb9f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
06a1a9932b3b6c974313e744f7991d3245b8fa8dae5535cba63bc8b2d1cdbb9f.exe
Resource
win10v2004-20241007-en
General
-
Target
06a1a9932b3b6c974313e744f7991d3245b8fa8dae5535cba63bc8b2d1cdbb9f
-
Size
421KB
-
MD5
f766c9cacc1eb71429af603c1a35018b
-
SHA1
621ef74f758735fd00705e1bdd21021dd544ef7d
-
SHA256
06a1a9932b3b6c974313e744f7991d3245b8fa8dae5535cba63bc8b2d1cdbb9f
-
SHA512
5799276bc4e832a2bb046f73be4d7f60139a75f829ed901f27d6d24bf9cd24313e21549bc9ab728e787742de137630604cdcf5b8a50f7658491bcb7b08c07e58
-
SSDEEP
12288:tGnrebhnoPdoYcN1DlT/SgReMD7ywtspuHEiAiK9Ui:wnSN4doYsXTqMywtspWAiK9Ui
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
metasploit_stager
192.168.150.158:2420
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06a1a9932b3b6c974313e744f7991d3245b8fa8dae5535cba63bc8b2d1cdbb9f
Files
-
06a1a9932b3b6c974313e744f7991d3245b8fa8dae5535cba63bc8b2d1cdbb9f.exe windows:4 windows x64 arch:x64
aad9139f7fb5874e39ed048023ec69e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
AllocateAndInitializeSid
CopySid
EqualSid
GetLengthSid
GetUserNameA
InitializeSecurityDescriptor
RegCloseKey
RegCreateKeyA
RegEnumKeyA
RegOpenKeyA
RegQueryValueExA
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
shell32
ShellExecuteA
Shell_NotifyIconA
user32
AppendMenuA
CreateDialogParamA
CreateMenu
CreatePopupMenu
CreateWindowExA
DefWindowProcA
DestroyIcon
DestroyMenu
DestroyWindow
DialogBoxParamA
DispatchMessageA
EnableWindow
EndDialog
FindWindowA
GetCursorPos
GetDesktopWindow
GetDlgItem
GetDlgItemTextA
GetMenuDefaultItem
GetMenuItemCount
GetMenuItemInfoA
GetMessageA
GetWindowLongPtrA
GetWindowRect
InsertMenuItemA
IsDialogMessageA
IsWindow
LoadIconA
MessageBeep
MessageBoxA
MessageBoxIndirectA
MoveWindow
MsgWaitForMultipleObjects
PeekMessageW
PostMessageA
PostQuitMessage
RegisterClassA
RegisterWindowMessageA
RemoveMenu
SendDlgItemMessageA
SendMessageA
SetActiveWindow
SetDlgItemTextA
SetForegroundWindow
SetMenuDefaultItem
SetWindowLongPtrA
SetWindowPos
ShowWindow
TrackPopupMenu
TranslateMessage
kernel32
CloseHandle
ConnectNamedPipe
CreateEventA
CreateFileA
CreateFileMappingA
CreateFileW
CreateMutexA
CreateNamedPipeA
CreateThread
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindFirstFileExW
FindNextFileW
FindResourceA
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsW
GetFileSizeEx
GetFileType
GetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetOverlappedResult
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetTempPathA
GetTickCount
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadResource
LocalAlloc
LocalFree
LockResource
MapViewOfFile
MultiByteToWideChar
OpenFileMappingA
OpenProcess
OutputDebugStringW
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
ReleaseMutex
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwind
RtlUnwindEx
RtlVirtualUnwind
SetCurrentDirectoryA
SetEndOfFile
SetEvent
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualQuery
WaitForSingleObject
WaitNamedPipeA
WideCharToMultiByte
WriteConsoleW
WriteFile
comdlg32
GetOpenFileNameA
GetSaveFileNameA
Sections
.text Size: 285KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.mbga Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ