Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cuckootest.exe

Overview

General Information

Sample name:cuckootest.exe
Analysis ID:1468117
MD5:ddc22949c7c7a0ec656612ccc613119b
SHA1:0de5148d4da2e60323f67f34de6d63fef973426e
SHA256:513f19d4cc003137e37dfb0694c53e824601a4324d8a32cef22ec8c0ac02f548
Infos:

Detection

Metasploit
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected Metasploit Payload
AI detected suspicious sample
Machine Learning detection for sample
Entry point lies outside standard sections
PE file contains an invalid checksum
PE file contains sections with non-standard names
Program does not show much activity (idle)
Yara signature match

Classification

  • System is w10x64
  • cuckootest.exe (PID: 6704 cmdline: "C:\Users\user\Desktop\cuckootest.exe" MD5: DDC22949C7C7A0EC656612CCC613119B)
  • cleanup
{"Type": "Metasploit Connect", "IP": "10.168.56.120", "Port": 4444}
SourceRuleDescriptionAuthorStrings
cuckootest.exeJoeSecurity_MetasploitPayload_2Yara detected Metasploit PayloadJoe Security
    cuckootest.exeJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
      cuckootest.exeWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
      • 0x1881:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      cuckootest.exeWindows_Trojan_Metasploit_91bc5d7dunknownunknown
      • 0x18d7:$a: 49 BE 77 73 32 5F 33 32 00 00 41 56 49 89 E6 48 81 EC A0 01 00 00 49 89 E5
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.3304403620.0000000140004000.00000080.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
        00000000.00000002.3304403620.0000000140004000.00000080.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
        • 0x81:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
        00000000.00000002.3304403620.0000000140004000.00000080.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_91bc5d7dunknownunknown
        • 0xd7:$a: 49 BE 77 73 32 5F 33 32 00 00 41 56 49 89 E6 48 81 EC A0 01 00 00 49 89 E5
        00000000.00000000.2064044061.0000000140004000.00000080.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
          00000000.00000000.2064044061.0000000140004000.00000080.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
          • 0x81:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
          Click to see the 1 entries
          SourceRuleDescriptionAuthorStrings
          0.0.cuckootest.exe.140000000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
            0.2.cuckootest.exe.140000000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
              0.2.cuckootest.exe.140000000.0.unpackWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
              • 0x16c9:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
              0.2.cuckootest.exe.140000000.0.unpackWindows_Trojan_Metasploit_91bc5d7dunknownunknown
              • 0x171f:$a: 49 BE 77 73 32 5F 33 32 00 00 41 56 49 89 E6 48 81 EC A0 01 00 00 49 89 E5
              0.0.cuckootest.exe.140000000.0.unpackWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
              • 0x16c9:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
              Click to see the 1 entries
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: cuckootest.exeAvira: detected
              Source: cuckootest.exeMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "10.168.56.120", "Port": 4444}
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: cuckootest.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\cuckootest.exeCode function: 0_2_00000001400040D6 LoadLibraryA,WSAStartup,WSASocketA,connect,recv,closesocket,0_2_00000001400040D6

              System Summary

              barindex
              Source: cuckootest.exe, type: SAMPLEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
              Source: cuckootest.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
              Source: 0.2.cuckootest.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
              Source: 0.2.cuckootest.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
              Source: 0.0.cuckootest.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
              Source: 0.0.cuckootest.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
              Source: 00000000.00000002.3304403620.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
              Source: 00000000.00000002.3304403620.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
              Source: 00000000.00000000.2064044061.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
              Source: 00000000.00000000.2064044061.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
              Source: cuckootest.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
              Source: cuckootest.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
              Source: 0.2.cuckootest.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
              Source: 0.2.cuckootest.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
              Source: 0.0.cuckootest.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
              Source: 0.0.cuckootest.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
              Source: 00000000.00000002.3304403620.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
              Source: 00000000.00000002.3304403620.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
              Source: 00000000.00000000.2064044061.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
              Source: 00000000.00000000.2064044061.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
              Source: classification engineClassification label: mal88.troj.winEXE@1/0@0/1
              Source: C:\Users\user\Desktop\cuckootest.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Users\user\Desktop\cuckootest.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\cuckootest.exeSection loaded: mswsock.dllJump to behavior
              Source: cuckootest.exeStatic PE information: Image base 0x140000000 > 0x60000000
              Source: initial sampleStatic PE information: section where entry point is pointing to: .gaqy
              Source: cuckootest.exeStatic PE information: real checksum: 0xcc55 should be: 0xce0d
              Source: cuckootest.exeStatic PE information: section name: .gaqy
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: cuckootest.exe, 00000000.00000002.3304336359.00000000005AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: cuckootest.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.cuckootest.exe.140000000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.cuckootest.exe.140000000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.3304403620.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2064044061.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              OS Credential Dumping1
              Security Software Discovery
              Remote ServicesData from Local System1
              Ingress Tool Transfer
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
              System Information Discovery
              Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              cuckootest.exe100%AviraTR/Crypt.XPACK.Gen7
              cuckootest.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              IP
              10.168.56.120
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1468117
              Start date and time:2024-07-05 11:11:31 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 3m 32s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:cuckootest.exe
              Detection:MAL
              Classification:mal88.troj.winEXE@1/0@0/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 1
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              No simulations
              No context
              No context
              No context
              No context
              No context
              No created / dropped files found
              File type:PE32+ executable (GUI) x86-64, for MS Windows
              Entropy (8bit):1.3163826011072188
              TrID:
              • Win64 Executable GUI (202006/5) 92.65%
              • Win64 Executable (generic) (12005/4) 5.51%
              • Generic Win/DOS Executable (2004/3) 0.92%
              • DOS Executable Generic (2002/1) 0.92%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:cuckootest.exe
              File size:7'168 bytes
              MD5:ddc22949c7c7a0ec656612ccc613119b
              SHA1:0de5148d4da2e60323f67f34de6d63fef973426e
              SHA256:513f19d4cc003137e37dfb0694c53e824601a4324d8a32cef22ec8c0ac02f548
              SHA512:97ff2a0aad6527f2511a6618d11154d71926ff0d8a0736f3046082223dad26465d2db643eb2fb06befbd4f6d7c342ea65e81decd8c63bc8c04ccc03e8ad663d1
              SSDEEP:24:eFGStrJ9u0/6PaFRnZdkBQAVWWY+BXKLq1eNDMSCvOXpmB:is07LkBQN+BXVSD9C2kB
              TLSH:CBE175233B144EB6E8BD157D5AE7FCA7A1495E292F2B43B28D280307396212875B5944
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......9$..}E..}E..}E..Z...~E..}E~..E..t=..|E..t=..|E..Rich}E..................PE..d...}<.K..........#......0...........@.........@...
              Icon Hash:00928e8e8686b000
              Entrypoint:0x140004000
              Entrypoint Section:.gaqy
              Digitally signed:false
              Imagebase:0x140000000
              Subsystem:windows gui
              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
              DLL Characteristics:TERMINAL_SERVER_AWARE
              Time Stamp:0x4BC63C7D [Wed Apr 14 22:06:53 2010 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:b4c6fff030479aa3b12625be67bf4914
              Instruction
              cld
              dec eax
              and esp, FFFFFFF0h
              call 00007FA700C5E7A1h
              inc ecx
              push ecx
              inc ecx
              push eax
              push edx
              push ecx
              dec eax
              xor edx, edx
              dec eax
              mov edx, dword ptr [edx+60h]
              push esi
              dec eax
              mov edx, dword ptr [edx+18h]
              dec eax
              mov edx, dword ptr [edx+20h]
              dec ebp
              xor ecx, ecx
              dec eax
              mov esi, dword ptr [edx+50h]
              dec eax
              movzx ecx, word ptr [edx+4Ah]
              dec eax
              xor eax, eax
              lodsb
              cmp al, 61h
              jl 00007FA700C5E6D4h
              sub al, 20h
              inc ecx
              ror ecx, 0Dh
              inc ecx
              add ecx, eax
              loop 00007FA700C5E6BFh
              push edx
              inc ecx
              push ecx
              dec eax
              mov edx, dword ptr [edx+20h]
              mov eax, dword ptr [edx+3Ch]
              dec eax
              add eax, edx
              cmp word ptr [eax+18h], 020Bh
              jne 00007FA700C5E748h
              mov eax, dword ptr [eax+00000088h]
              dec eax
              test eax, eax
              je 00007FA700C5E739h
              dec eax
              add eax, edx
              inc esp
              mov eax, dword ptr [eax+20h]
              dec ecx
              add eax, edx
              push eax
              mov ecx, dword ptr [eax+18h]
              jecxz 00007FA700C5E728h
              dec ebp
              xor ecx, ecx
              dec eax
              dec ecx
              inc ecx
              mov esi, dword ptr [eax+ecx*4]
              dec eax
              add esi, edx
              dec eax
              xor eax, eax
              lodsb
              inc ecx
              ror ecx, 0Dh
              inc ecx
              add ecx, eax
              cmp al, ah
              jne 00007FA700C5E6C3h
              dec esp
              add ecx, dword ptr [esp+08h]
              inc ebp
              cmp ecx, edx
              jne 00007FA700C5E6AAh
              pop eax
              inc esp
              mov eax, dword ptr [eax+24h]
              dec ecx
              add eax, edx
              inc cx
              mov ecx, dword ptr [eax+ecx*2]
              inc esp
              mov eax, dword ptr [eax+1Ch]
              dec ecx
              add eax, edx
              inc ecx
              mov eax, dword ptr [eax+ecx*4]
              inc ecx
              pop eax
              dec eax
              add eax, edx
              inc ecx
              pop eax
              pop esi
              pop ecx
              pop edx
              inc ecx
              pop eax
              inc ecx
              pop ecx
              inc ecx
              pop edx
              dec eax
              sub esp, 20h
              inc ecx
              Programming Language:
              • [IMP] VS2005 build 50727
              • [ASM] VS2008 SP1 build 30729
              • [LNK] VS2008 SP1 build 30729
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x42000x6c.gaqy
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x42700x8.gaqy
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x30000x18.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x104e0x1200a4a5deae25708a9e05f50bcad7075c86False0.025390625data0.16810049402497224IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x30000x840x200253b88122c36b6951090c6288183e4aeFalse0.15625data0.9630867345987311IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .gaqy0x40000x2780x400bdf516881e0ffd1c4796c7bb193b13e1False0.529296875data4.303515737960982IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              DLLImport
              KERNEL32.dllVirtualAlloc, ExitProcess
              TimestampSource PortDest PortSource IPDest IP
              Jul 5, 2024 11:12:17.455910921 CEST496994444192.168.2.610.168.56.120
              Jul 5, 2024 11:12:17.460809946 CEST44444969910.168.56.120192.168.2.6
              Jul 5, 2024 11:12:17.460895061 CEST496994444192.168.2.610.168.56.120
              Jul 5, 2024 11:12:38.834614992 CEST44444969910.168.56.120192.168.2.6
              Jul 5, 2024 11:12:38.834687948 CEST496994444192.168.2.610.168.56.120
              Jul 5, 2024 11:12:38.835088015 CEST496994444192.168.2.610.168.56.120
              Jul 5, 2024 11:12:38.835741043 CEST497054444192.168.2.610.168.56.120
              Jul 5, 2024 11:12:38.839827061 CEST44444969910.168.56.120192.168.2.6
              Jul 5, 2024 11:12:38.840518951 CEST44444970510.168.56.120192.168.2.6
              Jul 5, 2024 11:12:38.840611935 CEST497054444192.168.2.610.168.56.120
              Jul 5, 2024 11:13:00.430394888 CEST44444970510.168.56.120192.168.2.6
              Jul 5, 2024 11:13:00.430469036 CEST497054444192.168.2.610.168.56.120
              Jul 5, 2024 11:13:00.430784941 CEST497054444192.168.2.610.168.56.120
              Jul 5, 2024 11:13:00.431720972 CEST497074444192.168.2.610.168.56.120
              Jul 5, 2024 11:13:00.435543060 CEST44444970510.168.56.120192.168.2.6
              Jul 5, 2024 11:13:00.436611891 CEST44444970710.168.56.120192.168.2.6
              Jul 5, 2024 11:13:00.436678886 CEST497074444192.168.2.610.168.56.120
              Jul 5, 2024 11:13:21.818424940 CEST44444970710.168.56.120192.168.2.6
              Jul 5, 2024 11:13:21.818509102 CEST497074444192.168.2.610.168.56.120
              Jul 5, 2024 11:13:21.818809032 CEST497074444192.168.2.610.168.56.120
              Jul 5, 2024 11:13:21.819422960 CEST497094444192.168.2.610.168.56.120
              Jul 5, 2024 11:13:21.823596954 CEST44444970710.168.56.120192.168.2.6
              Jul 5, 2024 11:13:21.824214935 CEST44444970910.168.56.120192.168.2.6
              Jul 5, 2024 11:13:21.824282885 CEST497094444192.168.2.610.168.56.120
              Jul 5, 2024 11:13:43.209837914 CEST44444970910.168.56.120192.168.2.6
              Jul 5, 2024 11:13:43.209925890 CEST497094444192.168.2.610.168.56.120
              Jul 5, 2024 11:13:43.210259914 CEST497094444192.168.2.610.168.56.120
              Jul 5, 2024 11:13:43.210962057 CEST497104444192.168.2.610.168.56.120
              Jul 5, 2024 11:13:43.215046883 CEST44444970910.168.56.120192.168.2.6
              Jul 5, 2024 11:13:43.215756893 CEST44444971010.168.56.120192.168.2.6
              Jul 5, 2024 11:13:43.215845108 CEST497104444192.168.2.610.168.56.120
              Jul 5, 2024 11:14:04.584530115 CEST44444971010.168.56.120192.168.2.6
              Jul 5, 2024 11:14:04.584618092 CEST497104444192.168.2.610.168.56.120
              Jul 5, 2024 11:14:04.584944963 CEST497104444192.168.2.610.168.56.120
              Jul 5, 2024 11:14:04.585664034 CEST497114444192.168.2.610.168.56.120
              Jul 5, 2024 11:14:04.589699984 CEST44444971010.168.56.120192.168.2.6
              Jul 5, 2024 11:14:04.590565920 CEST44444971110.168.56.120192.168.2.6
              Jul 5, 2024 11:14:04.590641022 CEST497114444192.168.2.610.168.56.120

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:05:12:16
              Start date:05/07/2024
              Path:C:\Users\user\Desktop\cuckootest.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\cuckootest.exe"
              Imagebase:0x140000000
              File size:7'168 bytes
              MD5 hash:DDC22949C7C7A0EC656612CCC613119B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.3304403620.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.3304403620.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: unknown
              • Rule: Windows_Trojan_Metasploit_91bc5d7d, Description: unknown, Source: 00000000.00000002.3304403620.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: unknown
              • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000000.2064044061.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000000.2064044061.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: unknown
              • Rule: Windows_Trojan_Metasploit_91bc5d7d, Description: unknown, Source: 00000000.00000000.2064044061.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Author: unknown
              Reputation:low
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:42.8%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:87.5%
                Total number of Nodes:8
                Total number of Limit Nodes:2
                execution_graph 32 140004000 35 1400040d6 LoadLibraryA WSAStartup 32->35 36 14000411f WSASocketA 35->36 37 14000413e connect 36->37 38 14000415e recv 37->38 40 140004154 37->40 39 1400041d1 closesocket 38->39 38->40 39->36 40->37 40->38 40->39 41 1400041ee 40->41 41->41

                Callgraph

                • Executed
                • Not Executed
                • Opacity -> Relevance
                • Disassembly available
                callgraph 0 Function_00000001400040D6 1 Function_0000000140004000 1->0

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3304403620.0000000140004000.00000080.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                • Associated: 00000000.00000002.3304388095.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_140000000_cuckootest.jbxd
                Yara matches
                Similarity
                • API ID: LibraryLoadSocketStartupclosesocketconnectrecv
                • String ID: unMa$ws2_32
                • API String ID: 3143952708-2325342229
                • Opcode ID: aadf467b9bba3d6e7853af54162b4494fc07e63e5752c784457675d0e3ca1d44
                • Instruction ID: 8542e8a7860166566a82f2e2042ac849b6c0b4af27458df0085d80fbac2ea51f
                • Opcode Fuzzy Hash: aadf467b9bba3d6e7853af54162b4494fc07e63e5752c784457675d0e3ca1d44
                • Instruction Fuzzy Hash: 1021D0E2B5525828FA2BA2A33D17BF684456B29FE0F1840207F1E8F7D6D868C6C2411D