Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
XKfrTsDzj.exe

Overview

General Information

Sample name:XKfrTsDzj.exe
Analysis ID:1465757
MD5:a7e58880e45dbd5f5b2618ee63722e21
SHA1:8c3755417b2d2ec1701efe8e85df24ca5e6571e0
SHA256:023047d7da62aaeb9f3490f86283920703734f7496b14c64c0661834f4ab4561
Infos:

Detection

Metasploit
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

  • System is w7x64
  • XKfrTsDzj.exe (PID: 1592 cmdline: "C:\Users\user\Desktop\XKfrTsDzj.exe" MD5: A7E58880E45DBD5F5B2618EE63722E21)
  • cleanup
{"Type": "Metasploit Connect", "IP": "10.50.1.11", "Port": 4545}
SourceRuleDescriptionAuthorStrings
XKfrTsDzj.exeJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    XKfrTsDzj.exeJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
      XKfrTsDzj.exeWindows_Trojan_Metasploit_a6e956c9Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x6fdb:$a1: 60 89 E5 31 C0 64 8B 50 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF AC 3C 61 7C 02 2C 20
      XKfrTsDzj.exeMsfpayloads_msf_10Metasploit Payloads - file msf.exeFlorian Roth
      • 0x6fe6:$s1: 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF AC 3C 61
      • 0x7028:$s2: 01 C7 38 E0 75 F6 03 7D F8 3B 7D 24 75 E4 58 8B
      • 0x7048:$s3: 01 D0 89 44 24 24 5B 5B 61 59 5A 51 FF E0 5F 5F
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.865913176.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
        00000000.00000002.865913176.0000000000401000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_a6e956c9Identifies the API address lookup function leverage by metasploit shellcodeunknown
        • 0x5fdb:$a1: 60 89 E5 31 C0 64 8B 50 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF AC 3C 61 7C 02 2C 20
        00000000.00000002.865894062.0000000000020000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
          00000000.00000002.865894062.0000000000020000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_a6e956c9Identifies the API address lookup function leverage by metasploit shellcodeunknown
          • 0x6:$a1: 60 89 E5 31 C0 64 8B 50 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF AC 3C 61 7C 02 2C 20
          00000000.00000000.339032705.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
            Click to see the 1 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: XKfrTsDzj.exeAvira: detected
            Source: XKfrTsDzj.exeMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "10.50.1.11", "Port": 4545}
            Source: XKfrTsDzj.exeReversingLabs: Detection: 95%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
            Source: XKfrTsDzj.exeJoe Sandbox ML: detected
            Source: XKfrTsDzj.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: XKfrTsDzj.exe
            Source: XKfrTsDzj.exeString found in binary or memory: http://www.apache.org/
            Source: XKfrTsDzj.exeString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: XKfrTsDzj.exeString found in binary or memory: http://www.zeustech.net/

            System Summary

            barindex
            Source: XKfrTsDzj.exe, type: SAMPLEMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
            Source: XKfrTsDzj.exe, type: SAMPLEMatched rule: Metasploit Payloads - file msf.exe Author: Florian Roth
            Source: 00000000.00000002.865913176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
            Source: 00000000.00000002.865894062.0000000000020000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
            Source: 00000000.00000000.339032705.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
            Source: C:\Users\user\Desktop\XKfrTsDzj.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: XKfrTsDzj.exe, 00000000.00000002.865921737.0000000000415000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameab.exeF vs XKfrTsDzj.exe
            Source: XKfrTsDzj.exeBinary or memory string: OriginalFilenameab.exeF vs XKfrTsDzj.exe
            Source: XKfrTsDzj.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: XKfrTsDzj.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23
            Source: XKfrTsDzj.exe, type: SAMPLEMatched rule: Msfpayloads_msf_10 date = 2017-02-09, hash1 = 3cd74fa28323c0d64f45507675ac08fb09bae4dd6b7e11f2832a4fbc70bb7082, author = Florian Roth, description = Metasploit Payloads - file msf.exe, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000002.865913176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23
            Source: 00000000.00000002.865894062.0000000000020000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23
            Source: 00000000.00000000.339032705.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23
            Source: XKfrTsDzj.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@0/1
            Source: XKfrTsDzj.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\XKfrTsDzj.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: XKfrTsDzj.exeReversingLabs: Detection: 95%
            Source: C:\Users\user\Desktop\XKfrTsDzj.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Users\user\Desktop\XKfrTsDzj.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Users\user\Desktop\XKfrTsDzj.exeSection loaded: wsock32.dllJump to behavior
            Source: XKfrTsDzj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: XKfrTsDzj.exe
            Source: XKfrTsDzj.exeStatic PE information: section name: .text entropy: 7.010796144372727
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\XKfrTsDzj.exeProcess Stats: CPU usage > 42% for more than 60s
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: XKfrTsDzj.exe, type: SAMPLE
            Source: Yara matchFile source: 00000000.00000002.865913176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.865894062.0000000000020000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.339032705.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
            DLL Side-Loading
            1
            DLL Side-Loading
            11
            Virtualization/Sandbox Evasion
            OS Credential Dumping1
            Security Software Discovery
            Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
            Software Packing
            LSASS Memory11
            Virtualization/Sandbox Evasion
            Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            DLL Side-Loading
            Security Account Manager1
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Obfuscated Files or Information
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            XKfrTsDzj.exe96%ReversingLabsWin32.Trojan.CryptZMarte
            XKfrTsDzj.exe100%AviraTR/Patched.Gen2
            XKfrTsDzj.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.apache.org/licenses/LICENSE-2.00%URL Reputationsafe
            http://www.zeustech.net/0%Avira URL Cloudsafe
            http://www.apache.org/0%Avira URL Cloudsafe
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.apache.org/licenses/LICENSE-2.0XKfrTsDzj.exefalse
            • URL Reputation: safe
            unknown
            http://www.apache.org/XKfrTsDzj.exefalse
            • Avira URL Cloud: safe
            unknown
            http://www.zeustech.net/XKfrTsDzj.exefalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            IP
            10.50.1.11
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1465757
            Start date and time:2024-07-02 01:22:37 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 44s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
            Number of analysed new started processes analysed:3
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:XKfrTsDzj.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@1/0@0/1
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240s for sample files taking high CPU consumption
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
            • VT rate limit hit for: XKfrTsDzj.exe
            No simulations
            No context
            No context
            No context
            No context
            No context
            No created / dropped files found
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):6.318304425058011
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:XKfrTsDzj.exe
            File size:73'802 bytes
            MD5:a7e58880e45dbd5f5b2618ee63722e21
            SHA1:8c3755417b2d2ec1701efe8e85df24ca5e6571e0
            SHA256:023047d7da62aaeb9f3490f86283920703734f7496b14c64c0661834f4ab4561
            SHA512:0c85974abfb0ea2c11a4ab3732475f2e5c8ccbfc4e1f747c1643a1c1031b21b1c613c64fd4234314b4e741b950c09f0750a9a1e71436b467a2df4c1300792cf8
            SSDEEP:1536:I8pZ/p7oSARKxQGTvHJBLHMm/Mb+KR0Nc8QsJq39:rp7DARKxQMLHMee0Nc8QsC9
            TLSH:6573D082D9C05026C1AA123D2A763A7A9974F5B63711C1AA7A4CCDF6DFC1CF092373C6
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...Y...Y...Y...E...Y..TE...Y...F...Y...F...Y...Y...Y..TQ...Y...z...Y..._...Y..Rich.Y..................PE..L...S..I...........
            Icon Hash:aaf3e3e3918382a0
            Entrypoint:0x409e00
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            DLL Characteristics:
            Time Stamp:0x49E7E853 [Fri Apr 17 02:24:19 2009 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:481f47bbb2c9c21e108d65f52b04c448
            Instruction
            cmc
            stc
            dec edx
            xchg eax, ebx
            std
            dec eax
            clc
            cwde
            dec eax
            wait
            inc ecx
            inc ecx
            dec edx
            dec ecx
            dec ebx
            stc
            dec edx
            inc ebx
            dec eax
            xchg eax, ecx
            dec ecx
            das
            xchg eax, edx
            inc ebx
            cwde
            cwde
            dec ebx
            dec edx
            xchg eax, ebx
            stc
            dec edx
            clc
            xchg eax, edx
            dec eax
            inc ecx
            clc
            dec eax
            dec ebx
            salc
            aas
            clc
            xchg eax, ebx
            xchg eax, ecx
            xchg eax, edx
            std
            clc
            das
            cdq
            dec edx
            cdq
            daa
            stc
            stc
            dec edx
            xchg eax, ebx
            xchg eax, ebx
            xchg eax, ecx
            dec ecx
            xchg eax, ecx
            dec edx
            dec eax
            stc
            dec eax
            inc ecx
            xchg eax, edx
            std
            xchg eax, ebx
            stc
            std
            aas
            std
            cdq
            salc
            aas
            aaa
            salc
            lahf
            aaa
            inc ebx
            inc ecx
            xchg eax, ebx
            inc ecx
            dec ecx
            das
            std
            lahf
            aaa
            cwde
            xchg eax, ebx
            inc edx
            clc
            daa
            dec ebx
            std
            inc edx
            lahf
            aaa
            das
            inc eax
            aaa
            xchg eax, ebx
            std
            aaa
            cmc
            aaa
            cdq
            cmc
            xchg eax, edx
            cmc
            stc
            xchg eax, ebx
            salc
            xchg eax, edx
            dec eax
            daa
            stc
            inc edx
            wait
            aaa
            daa
            cmc
            inc edx
            nop
            cmc
            nop
            lahf
            salc
            lahf
            dec eax
            inc ebx
            stc
            aaa
            stc
            clc
            dec edx
            cwde
            xchg eax, ebx
            jmp 00007FC001024554h
            inc eax
            cmpsd
            mov dword ptr [5C41062Ch], 00EB0000h
            ret
            nop
            nop
            arpl word ptr [eax-1374AA70h], dx
            mov cl, byte ptr [ebp-06h]
            xor eax, eax
            test cl, 00000020h
            je 00007FC0010278D7h
            mov eax, 00006201h
            test cl, 00000040h
            je 00007FC0010278D4h
            or al, 02h
            imul ch
            push edx
            je 00007FC0010278D4h
            or al, 04h
            mov ecx, dword ptr [ebp-5Ah]
            sub al, E0h
            mov ebx, eax
            Programming Language:
            • [EXP] VC++ 6.0 SP5 build 8804
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0xc76c0x78.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x7c8.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0xc1e00x1c.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0xc0000x1e0.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xa9660xb0003bdad95d8666099fd0db090992330a16False0.8136097301136364data7.010796144372727IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0xc0000xfe60x100025d7ceee3aa85bb3e8c5174736f6f830False0.46142578125DOS executable (COM, 0x8C-variant)5.318390353744998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0xd0000x705c0x4000283b5f792323d57b9db4d2bcc46580f8False0.25634765625Matlab v4 mat-file (little endian) d, numeric, rows 0, columns 04.407841023203495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x150000x7c80x1000c13a9413aea7291b6fc85d75bfcde381False0.197998046875data1.958296025171192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_VERSION0x150600x768dataEnglishUnited States0.40189873417721517
            DLLImport
            MSVCRT.dll_iob, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __p___initenv, _XcptFilter, _exit, _onexit, __dllonexit, strrchr, wcsncmp, _close, wcslen, wcscpy, strerror, modf, strspn, realloc, __p__environ, __p__wenviron, _errno, free, strncmp, strstr, strncpy, _ftol, qsort, fopen, perror, fclose, fflush, calloc, malloc, signal, printf, _isctype, atoi, exit, __mb_cur_max, _pctype, strchr, fprintf, _controlfp, _strdup, _strnicmp
            KERNEL32.dllPeekNamedPipe, ReadFile, WriteFile, LoadLibraryA, GetProcAddress, GetVersionExA, GetExitCodeProcess, TerminateProcess, LeaveCriticalSection, SetEvent, ReleaseMutex, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, CreateMutexA, GetFileType, SetLastError, FreeEnvironmentStringsW, GetEnvironmentStringsW, GlobalFree, GetCommandLineW, TlsAlloc, TlsFree, DuplicateHandle, GetCurrentProcess, SetHandleInformation, CloseHandle, GetSystemTimeAsFileTime, FileTimeToSystemTime, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, Sleep, FormatMessageA, GetLastError, WaitForSingleObject, CreateEventA, SetStdHandle, SetFilePointer, CreateFileA, CreateFileW, GetOverlappedResult, DeviceIoControl, GetFileInformationByHandle, LocalFree
            ADVAPI32.dllFreeSid, AllocateAndInitializeSid
            WSOCK32.dllgetsockopt, connect, htons, gethostbyname, ntohl, inet_ntoa, setsockopt, socket, closesocket, select, ioctlsocket, __WSAFDIsSet, WSAStartup, WSACleanup, WSAGetLastError
            WS2_32.dllWSARecv, WSASend
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampSource PortDest PortSource IPDest IP
            Jul 2, 2024 01:23:23.980468988 CEST491634545192.168.2.2210.50.1.11
            Jul 2, 2024 01:23:23.985340118 CEST45454916310.50.1.11192.168.2.22
            Jul 2, 2024 01:23:23.985408068 CEST491634545192.168.2.2210.50.1.11
            Jul 2, 2024 01:23:45.357244968 CEST45454916310.50.1.11192.168.2.22
            Jul 2, 2024 01:23:45.357342005 CEST491634545192.168.2.2210.50.1.11

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Target ID:0
            Start time:19:23:23
            Start date:01/07/2024
            Path:C:\Users\user\Desktop\XKfrTsDzj.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\XKfrTsDzj.exe"
            Imagebase:0x400000
            File size:73'802 bytes
            MD5 hash:A7E58880E45DBD5F5B2618EE63722E21
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.865913176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_a6e956c9, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.865913176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.865894062.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_a6e956c9, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.865894062.0000000000020000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000000.339032705.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_a6e956c9, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000000.339032705.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
            Reputation:low
            Has exited:false

            No disassembly