CreateDCW
DeleteDC
GetFirmwareType
RtlCheckPortableOperatingSystem
Behavioral task
behavioral1
Sample
9317756003f999b304dc5e18b39395fd565da6e7a93c7816fa775ff822c6a25f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9317756003f999b304dc5e18b39395fd565da6e7a93c7816fa775ff822c6a25f.exe
Resource
win10v2004-20250217-en
Target
9317756003f999b304dc5e18b39395fd565da6e7a93c7816fa775ff822c6a25f
Size
3.2MB
MD5
6c384ccee462a38218d10246bbf080c6
SHA1
3da36f92fd84dec584782ae830a11fd92f17fce4
SHA256
9317756003f999b304dc5e18b39395fd565da6e7a93c7816fa775ff822c6a25f
SHA512
ee258dc82b44de5e98b9d8f5d7e9322d975b36ab0e625ef889736e91569059cfacb829ea33117a0dbf8d2ae78516b21c5d01cd85bc9ebb16e4e9e568608a385b
SSDEEP
49152:4R6T2tENWqhw+pSYryLTQ4ullYF5svlRlZPAoTMZmhJv3eEkF/L:fOAwvAImAoTMgJvuL
metasploit
encoder/shikata_ga_nai
metasploit
metasploit_stager
192.168.75.128:1234
Checks for missing Authenticode signature.
resource |
---|
9317756003f999b304dc5e18b39395fd565da6e7a93c7816fa775ff822c6a25f |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
HeapFree
GetModuleHandleExW
GetModuleFileNameA
DebugBreak
GetModuleHandleW
GetProcAddress
GetLastError
IsDebuggerPresent
OutputDebugStringW
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
AcquireSRWLockShared
ReleaseSRWLockShared
SetLastError
CloseHandle
ReleaseSemaphore
ReleaseMutex
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
WaitForSingleObjectEx
EnterCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
WaitForSingleObject
OpenSemaphoreW
CreateThreadpoolTimer
Sleep
HeapSetInformation
GetSystemTimeAsFileTime
GetCurrentProcessId
CreateMutexExW
LeaveCriticalSection
CreateSemaphoreExW
LocalAlloc
HeapAlloc
LoadLibraryExA
VirtualProtect
LocalFree
WideCharToMultiByte
UnmapViewOfFile
GetFileInformationByHandle
VirtualQuery
MapViewOfFile
CreateFileMappingW
GetFileSizeEx
RaiseException
FindClose
FindNextFileW
FindFirstFileW
GetFileAttributesW
MultiByteToWideChar
GetSystemWow64DirectoryW
GetSystemDirectoryW
HeapReAlloc
LoadLibraryExW
WaitNamedPipeW
CreateFileW
GetModuleFileNameW
OutputDebugStringA
WriteFile
SetNamedPipeHandleState
FreeLibrary
GetTickCount
QueryPerformanceCounter
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetProcessHeap
GetCurrentThreadId
GetSystemInfo
FormatMessageW
_initterm
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
_XcptFilter
free
_purecall
_wfullpath
printf
vprintf
memmove_s
??0exception@@QEAA@XZ
_vsnprintf_s
memcpy_s
_vsnwprintf
??0exception@@QEAA@AEBV0@@Z
??1exception@@UEAA@XZ
_wcsicmp
_commode
_vsnprintf
strcpy_s
strchr
__C_specific_handler
_wcsnicmp
wcschr
wcsrchr
wcscpy_s
wcscat_s
_wcslwr
wcsstr
wcsncmp
_strdup
_strrev
bsearch_s
_stricmp
_wcsrev
qsort_s
strrchr
strncpy_s
_ui64toa_s
_strnicmp
wcstombs_s
swscanf_s
malloc
_callnewh
??1type_info@@UEAA@XZ
iswalpha
_lock
sprintf_s
_fmode
_unlock
__dllonexit
memset
_onexit
?terminate@@YAXXZ
_CxxThrowException
memcmp
memcpy
memmove
__CxxFrameHandler3
ZwOpenKey
ZwEnumerateKey
RtlInitUnicodeStringEx
ZwQueryValueKey
RtlAppendUnicodeStringToString
RtlAppendUnicodeToString
EtwEventUnregister
EtwEventWrite
EtwEventRegister
RtlGUIDFromString
RtlUpcaseUnicodeChar
RtlGetNativeSystemInformation
ZwQuerySystemInformation
RtlCharToInteger
RtlNtStatusToDosError
RtlInitUnicodeString
ZwClose
RtlLeaveCriticalSection
RtlFreeHeap
RtlMultiByteToUnicodeN
RtlInitAnsiString
RtlEnterCriticalSection
RtlReAllocateHeap
RtlEqualString
RtlAllocateHeap
RtlDeleteCriticalSection
EtwEventWriteNoRegistration
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlInitializeCriticalSection
CoCreateInstance
CoUninitialize
CoInitializeEx
VariantInit
SysFreeString
SysAllocString
SysStringLen
VariantClear
EventUnregister
EventWriteTransfer
EventRegister
PathFindExtensionA
PathStripPathW
PathRemoveBackslashW
PathFindExtensionW
CLRCreateInstance
CreateDCW
DeleteDC
GetFirmwareType
RtlCheckPortableOperatingSystem
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ