Behavioral task
behavioral1
Sample
061e21868f4f3ffd2695c0482fe2e5bfd4ce6ab4008c1b9d988968d772348a74.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
061e21868f4f3ffd2695c0482fe2e5bfd4ce6ab4008c1b9d988968d772348a74.exe
Resource
win10v2004-20241007-en
General
-
Target
061e21868f4f3ffd2695c0482fe2e5bfd4ce6ab4008c1b9d988968d772348a74
-
Size
177KB
-
MD5
b3a428d6d0a9f080cf47ad9e3c1bc0d7
-
SHA1
2eaea2a6da46ddfa2dc3ad64e68fa820972a034d
-
SHA256
061e21868f4f3ffd2695c0482fe2e5bfd4ce6ab4008c1b9d988968d772348a74
-
SHA512
3251dcb017b790c44ad4233c65498cf1538673ffa373b92505dda4bb926a634c6ebc716e0afec5de5bb08ccb3e6f745ed3c7fb2f989344a1412333400134317d
-
SSDEEP
3072:MXHZ6gtMrv2FGR1lXU53laRWiNJq0YfuyXBXb+E7NBTe2g0i0IZ:MEgqrv2I3UlaRWQImy99IZ
Malware Config
Extracted
metasploit
windows/download_exec
http://192.168.245.128:443/qhJ9
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 061e21868f4f3ffd2695c0482fe2e5bfd4ce6ab4008c1b9d988968d772348a74
Files
-
061e21868f4f3ffd2695c0482fe2e5bfd4ce6ab4008c1b9d988968d772348a74.exe windows:6 windows x86 arch:x86
b6dde97c4bc03c183089805bf7d702b1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleFileNameW
WaitForSingleObject
CreateToolhelp32Snapshot
CreateEventW
Sleep
Process32NextW
SetEvent
GetCurrentThread
Process32FirstW
CloseHandle
CreateThread
ResetEvent
AddVectoredExceptionHandler
lstrcpyW
CreateFileW
HeapSize
GetProcessHeap
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
GetCPInfo
GetLastError
GetCurrentProcess
GetCurrentThreadId
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualQuery
VirtualProtectEx
VirtualQueryEx
SetLastError
FreeLibrary
GetModuleHandleW
GetProcAddress
LoadLibraryExW
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
HeapFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapAlloc
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
WriteConsoleW
user32
MessageBoxW
setupapi
SetupDiDestroyDeviceInfoList
SetupDiGetClassDevsW
SetupDiEnumDeviceInfo
shlwapi
PathFindFileNameW
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ