Windows Analysis Report
ranger.exe

Overview

General Information

Sample name: ranger.exe
Analysis ID: 1446995
MD5: b3ba78b4f562d45a5bda794b03f2e214
SHA1: 720608bd51cdf1f346b0abf3eb8bc226780a34ec
SHA256: 948a274743d75bf229fe26ad36fb41d64914e349341513aa2f5fb6b48e5c1eeb
Tags: exemetasploitrozenashellcode
Infos:

Detection

Metasploit
Score: 96
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
Machine Learning detection for sample
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

AV Detection

barindex
Source: ranger.exe Avira: detected
Source: ranger.exe Malware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "185.228.139.123", "Port": 80}
Source: ranger.exe ReversingLabs: Detection: 86%
Source: ranger.exe Virustotal: Detection: 86% Perma Link
Source: Submited Sample Integrated Neural Analysis Model: Matched 99.6% probability
Source: ranger.exe Joe Sandbox ML: detected
Source: ranger.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: ranger.exe
Source: C:\Users\user\Desktop\ranger.exe Code function: 4x nop then stc 0_2_00408340
Source: C:\Users\user\Desktop\ranger.exe Code function: 4x nop then cmp al, 0Dh 0_2_00406D47
Source: C:\Users\user\Desktop\ranger.exe Code function: 4x nop then push ebp 0_2_00406D8A
Source: Joe Sandbox View ASN Name: NETCUP-ASnetcupGmbHDE NETCUP-ASnetcupGmbHDE
Source: unknown TCP traffic detected without corresponding DNS query: 185.228.139.123
Source: unknown TCP traffic detected without corresponding DNS query: 185.228.139.123
Source: unknown TCP traffic detected without corresponding DNS query: 185.228.139.123
Source: unknown TCP traffic detected without corresponding DNS query: 185.228.139.123
Source: unknown TCP traffic detected without corresponding DNS query: 185.228.139.123
Source: unknown TCP traffic detected without corresponding DNS query: 185.228.139.123
Source: unknown TCP traffic detected without corresponding DNS query: 185.228.139.123
Source: unknown TCP traffic detected without corresponding DNS query: 185.228.139.123
Source: unknown TCP traffic detected without corresponding DNS query: 185.228.139.123
Source: unknown TCP traffic detected without corresponding DNS query: 185.228.139.123
Source: C:\Users\user\Desktop\ranger.exe Code function: 0_2_00470095 WSASocketA,connect,recv,closesocket, 0_2_00470095
Source: ranger.exe String found in binary or memory: http://www.apache.org/
Source: ranger.exe String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: ranger.exe String found in binary or memory: http://www.zeustech.net/

System Summary

barindex
Source: ranger.exe, type: SAMPLE Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
Source: 0.0.ranger.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
Source: 0.2.ranger.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
Source: 00000000.00000000.1296152055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
Source: 00000000.00000002.2538018061.0000000000470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
Source: 00000000.00000002.2537923110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
Source: ranger.exe, 00000000.00000000.1296199197.0000000000415000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenameab.exeF vs ranger.exe
Source: ranger.exe Binary or memory string: OriginalFilenameab.exeF vs ranger.exe
Source: ranger.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: ranger.exe, type: SAMPLE Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
Source: 0.0.ranger.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
Source: 0.2.ranger.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
Source: 00000000.00000000.1296152055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
Source: 00000000.00000002.2538018061.0000000000470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
Source: 00000000.00000002.2537923110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
Source: ranger.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engine Classification label: mal96.troj.winEXE@1/0@0/1
Source: ranger.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\ranger.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: ranger.exe ReversingLabs: Detection: 86%
Source: ranger.exe Virustotal: Detection: 86%
Source: C:\Users\user\Desktop\ranger.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\ranger.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Users\user\Desktop\ranger.exe Section loaded: mswsock.dll Jump to behavior
Source: ranger.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: ranger.exe
Source: C:\Users\user\Desktop\ranger.exe Code function: 0_2_00404A48 pushfd ; ret 0_2_00404A51
Source: C:\Users\user\Desktop\ranger.exe Code function: 0_2_00405450 push eax; ret 0_2_00405505
Source: C:\Users\user\Desktop\ranger.exe Code function: 0_2_00401234 push eax; ret 0_2_00401253
Source: C:\Users\user\Desktop\ranger.exe Code function: 0_2_004010C7 push 3B04C483h; ret 0_2_004010CD
Source: C:\Users\user\Desktop\ranger.exe Code function: 0_2_00403890 push edx; ret 0_2_00403898
Source: C:\Users\user\Desktop\ranger.exe Code function: 0_2_00403494 push dword ptr [ecx-74h]; retn 0040h 0_2_004034AA
Source: C:\Users\user\Desktop\ranger.exe Code function: 0_2_00404AB7 push ebx; retf 0_2_00404C8F
Source: C:\Users\user\Desktop\ranger.exe Code function: 0_2_00404B1B push ebx; retf 0_2_00404C8F
Source: C:\Users\user\Desktop\ranger.exe Code function: 0_2_00404B3D push ebx; retf 0_2_00404C8F
Source: C:\Users\user\Desktop\ranger.exe Code function: 0_2_0040753D push esi; ret 0_2_0040753E
Source: C:\Users\user\Desktop\ranger.exe Code function: 0_2_0040458C push ebx; iretd 0_2_0040459E
Source: C:\Users\user\Desktop\ranger.exe Code function: 0_2_00404BA5 push ebx; retf 0_2_00404C8F
Source: C:\Users\user\Desktop\ranger.exe Code function: 0_2_004031BF push ebp; retf 0_2_004031C1
Source: ranger.exe Static PE information: section name: .text entropy: 7.007255130754283
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: ranger.exe, 00000000.00000002.2538097549.000000000069E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\ranger.exe Code function: 0_2_004096C0 AllocateAndInitializeSid, 0_2_004096C0

Remote Access Functionality

barindex
Source: Yara match File source: ranger.exe, type: SAMPLE
Source: Yara match File source: 0.0.ranger.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.ranger.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000000.1296152055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2538018061.0000000000470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2537923110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs