Source: cHZiG7fsJb.exe |
Malware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "212.192.213.56", "Port": 4488} |
Source: cHZiG7fsJb.exe |
ReversingLabs: Detection: 87% |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 99.8% probability |
Source: cHZiG7fsJb.exe |
Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: |
Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: cHZiG7fsJb.exe |
Source: C:\Users\user\Desktop\cHZiG7fsJb.exe |
Code function: 4x nop then pop esp |
0_2_00401E74 |
Source: C:\Users\user\Desktop\cHZiG7fsJb.exe |
Code function: 4x nop then fxch4 st(6) |
0_2_00406740 |
Source: global traffic |
TCP traffic: 192.168.2.5:49704 -> 212.192.213.56:4488 |
Source: Joe Sandbox View |
ASN Name: LIVECOMM-ASRespublikanskayastr3k6RU LIVECOMM-ASRespublikanskayastr3k6RU |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 212.192.213.56 |
Source: C:\Users\user\Desktop\cHZiG7fsJb.exe |
Code function: 0_2_00590095 WSASocketA,connect,recv,closesocket, |
0_2_00590095 |
Source: cHZiG7fsJb.exe |
String found in binary or memory: http://www.apache.org/ |
Source: cHZiG7fsJb.exe |
String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0 |
Source: cHZiG7fsJb.exe |
String found in binary or memory: http://www.zeustech.net/ |
Source: cHZiG7fsJb.exe, type: SAMPLE |
Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: 0.0.cHZiG7fsJb.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: 0.2.cHZiG7fsJb.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: 00000000.00000002.2083738296.0000000000590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: 00000000.00000002.2083593181.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: 00000000.00000000.2069743417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown |
Source: cHZiG7fsJb.exe, 00000000.00000002.2083647972.0000000000415000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenameab.exeF vs cHZiG7fsJb.exe |
Source: cHZiG7fsJb.exe |
Binary or memory string: OriginalFilenameab.exeF vs cHZiG7fsJb.exe |
Source: cHZiG7fsJb.exe |
Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: cHZiG7fsJb.exe, type: SAMPLE |
Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: 0.0.cHZiG7fsJb.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: 0.2.cHZiG7fsJb.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: 00000000.00000002.2083738296.0000000000590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: 00000000.00000002.2083593181.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: 00000000.00000000.2069743417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23 |
Source: cHZiG7fsJb.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: classification engine |
Classification label: mal96.troj.winEXE@1/0@0/1 |
Source: cHZiG7fsJb.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\cHZiG7fsJb.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: cHZiG7fsJb.exe |
ReversingLabs: Detection: 87% |
Source: C:\Users\user\Desktop\cHZiG7fsJb.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\cHZiG7fsJb.exe |
Section loaded: wsock32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\cHZiG7fsJb.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: cHZiG7fsJb.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: |
Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: cHZiG7fsJb.exe |
Source: C:\Users\user\Desktop\cHZiG7fsJb.exe |
Code function: 0_2_00404477 push eax; ret |
0_2_0040454E |
Source: C:\Users\user\Desktop\cHZiG7fsJb.exe |
Code function: 0_2_0040B805 push eax; ret |
0_2_0040B86E |
Source: C:\Users\user\Desktop\cHZiG7fsJb.exe |
Code function: 0_2_00405434 push es; iretd |
0_2_00405435 |
Source: C:\Users\user\Desktop\cHZiG7fsJb.exe |
Code function: 0_2_004042A8 push 0040EA20h; retf |
0_2_004042C8 |
Source: C:\Users\user\Desktop\cHZiG7fsJb.exe |
Code function: 0_2_00404505 push eax; ret |
0_2_0040454E |
Source: C:\Users\user\Desktop\cHZiG7fsJb.exe |
Code function: 0_2_00406F1E push 0000005Dh; retn 0014h |
0_2_00406F2D |
Source: C:\Users\user\Desktop\cHZiG7fsJb.exe |
Code function: 0_2_00405721 pushfd ; ret |
0_2_00405722 |
Source: C:\Users\user\Desktop\cHZiG7fsJb.exe |
Code function: 0_2_00406D3F push es; ret |
0_2_00406D45 |
Source: cHZiG7fsJb.exe |
Static PE information: section name: .text entropy: 7.024280591711365 |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: cHZiG7fsJb.exe, 00000000.00000002.2083767995.000000000064E000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: Yara match |
File source: cHZiG7fsJb.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.cHZiG7fsJb.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.cHZiG7fsJb.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000002.2083738296.0000000000590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2083593181.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000000.2069743417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY |