Behavioral task
behavioral1
Sample
86e744903f36f794f065e47f9149d302872bae7457548dc17f28c381eb286905.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
86e744903f36f794f065e47f9149d302872bae7457548dc17f28c381eb286905.exe
Resource
win10v2004-20241007-en
General
-
Target
86e744903f36f794f065e47f9149d302872bae7457548dc17f28c381eb286905
-
Size
2.3MB
-
MD5
c2a1eb6aae267f50d452db8e3836f05f
-
SHA1
ab4b076efd56d93c400d42bbcd31d29fa8aabcc4
-
SHA256
86e744903f36f794f065e47f9149d302872bae7457548dc17f28c381eb286905
-
SHA512
3e789a64db7214f14b9be2d61a2dfe1175b51e743cf1c3b6b6217bf50c204b337d8eb5de6501b00bd8848999e12370bc826fa22f5382418f67e001681b3a8c73
-
SSDEEP
12288:ddTEzfxUVkStWgS/pdPcrGuXQ1hv+ID821kgqrSory3Q0sJMg5j69KW2jddN8t23:LTwfxUVkStooVrxryI969KWkddN8tI
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
10.8.8.250:443
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 86e744903f36f794f065e47f9149d302872bae7457548dc17f28c381eb286905
Files
-
86e744903f36f794f065e47f9149d302872bae7457548dc17f28c381eb286905.exe windows:4 windows x86 arch:x86
2612c3ddad2e99252dcdd549ddc8af25
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetFileSecurityW
GetSecurityDescriptorOwner
LookupAccountSidW
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
kernel32
CloseHandle
CompareStringW
CopyFileW
CreateDirectoryW
CreateFileW
CreateHardLinkW
CreateProcessW
CreateSymbolicLinkW
DeleteFileW
DuplicateHandle
ExitProcess
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
FileTimeToSystemTime
FillConsoleOutputAttribute
FillConsoleOutputCharacterW
FindClose
FindFirstFileW
FindNextFileW
FormatMessageW
FreeEnvironmentStringsW
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetCurrentDirectoryW
GetDateFormatW
GetDiskFreeSpaceExW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFullPathNameW
GetLocalTime
GetModuleHandleW
GetOEMCP
GetProcAddress
GetShortPathNameW
GetStartupInfoW
GetStdHandle
GetSystemDirectoryW
GetTempFileNameW
GetTempPathW
GetTickCount
GetTimeFormatW
GetVolumeInformationW
HeapAlloc
HeapReAlloc
IsBadStringPtrW
LocalAlloc
LocalFree
MoveFileExW
MoveFileW
MultiByteToWideChar
ReadConsoleW
ReadFile
RemoveDirectoryW
SearchPathW
SetConsoleCursorPosition
SetConsoleMode
SetConsoleTextAttribute
SetConsoleTitleW
SetCurrentDirectoryW
SetEnvironmentVariableW
SetFileAttributesW
SetFilePointer
SetFilePointerEx
SetStdHandle
SetVolumeLabelW
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcmpW
lstrcmpiW
LoadLibraryA
ntdll
RtlGetVersion
_vsnprintf
shell32
FindExecutableW
SHFileOperationW
SHGetFileInfoW
ucrtbase
__acrt_iob_func
__p___argc
__p___wargv
__stdio_common_vsprintf
__stdio_common_vswprintf
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_set_app_type
_strdup
_time32
_wcsicmp
_wcsnicmp
_wcsrev
_wcsupr
_wfopen
_wsplitpath
exit
fclose
feof
fgetws
free
fwrite
getenv
iswdigit
iswspace
malloc
memchr
memcmp
memcpy
memmove
memset
qsort
rand
realloc
srand
strchr
strcmp
strcpy
strcspn
strlen
tolower
toupper
towlower
towupper
wcschr
wcscspn
wcslen
wcsncmp
wcspbrk
wcsrchr
wcsstr
wcstol
wcstoul
user32
CharNextExA
CharUpperBuffW
IsCharAlphaNumericW
IsCharAlphaW
LoadStringW
wsprintfW
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 69KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 772KB - Virtual size: 770KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/14 Size: 4KB - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/29 Size: 232KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/41 Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/55 Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/67 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/78 Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/89 Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 770KB - Virtual size: 770KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ