Source: 00000005.00000002.1884397923.0000000000741000.00000004.00000020.00020000.00000000.sdmp |
Malware Configuration Extractor: Metasploit {"Type": "Shell Bind TCP", "Listen Port": 20} |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Code function: 0_2_00402450 CryptStringToBinaryA,CryptStringToBinaryA,766B3C50, |
0_2_00402450 |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Code function: 0_2_00401280 _fwprintf,CryptBinaryToStringA, |
0_2_00401280 |
Source: sample-20240612.exe |
Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Code function: 0_2_00401580 OpenClipboard,GetClipboardData,CloseClipboard,_fwprintf,socket,htons,inet_addr,htons,GetCurrentProcessId,htons,sendto,recvfrom, |
0_2_00401580 |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Code function: 0_2_00401580 OpenClipboard,GetClipboardData,CloseClipboard,_fwprintf,socket,htons,inet_addr,htons,GetCurrentProcessId,htons,sendto,recvfrom, |
0_2_00401580 |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Code function: 0_2_00401580 OpenClipboard,GetClipboardData,CloseClipboard,_fwprintf,socket,htons,inet_addr,htons,GetCurrentProcessId,htons,sendto,recvfrom, |
0_2_00401580 |
Source: 00000005.00000002.1884397923.0000000000741000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 0000000D.00000002.2980998413.00000000006E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000007.00000002.2980996164.0000000003230000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000004.00000002.2981002514.0000000000730000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000000.00000002.1773478268.000000000052B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 0000000B.00000002.1968225509.00000000006A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: sample-20240612.exe |
Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: 00000005.00000002.1884397923.0000000000741000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 0000000D.00000002.2980998413.00000000006E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000007.00000002.2980996164.0000000003230000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000004.00000002.2981002514.0000000000730000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000000.00000002.1773478268.000000000052B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 0000000B.00000002.1968225509.00000000006A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2104:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6768:120:WilError_03 |
Source: C:\Users\user\Pictures\pressica.exe |
Mutant created: \Sessions\1\BaseNamedObjects\toxotidae |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3852:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7148:120:WilError_03 |
Source: unknown |
Process created: C:\Users\user\Desktop\sample-20240612.exe "C:\Users\user\Desktop\sample-20240612.exe" |
|
Source: C:\Users\user\Desktop\sample-20240612.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\sample-20240612.exe |
Process created: C:\Windows\SysWOW64\xcopy.exe "C:\Windows\System32\xcopy.exe" /f /y "C:\Users\user\Desktop\sample-20240612.exe" "C:\Users\user\Pictures\pressica.exe*" |
|
Source: C:\Windows\SysWOW64\xcopy.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\sample-20240612.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
|
Source: unknown |
Process created: C:\Users\user\Pictures\pressica.exe "C:\Users\user\Pictures\pressica.exe" |
|
Source: C:\Users\user\Pictures\pressica.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Pictures\pressica.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
|
Source: unknown |
Process created: C:\Users\user\Pictures\pressica.exe "C:\Users\user\Pictures\pressica.exe" |
|
Source: C:\Users\user\Pictures\pressica.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Pictures\pressica.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
|
Source: C:\Users\user\Desktop\sample-20240612.exe |
Process created: C:\Windows\SysWOW64\xcopy.exe "C:\Windows\System32\xcopy.exe" /f /y "C:\Users\user\Desktop\sample-20240612.exe" "C:\Users\user\Pictures\pressica.exe*" |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: vcruntime140.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe |
Section loaded: ulib.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe |
Section loaded: ifsutil.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe |
Section loaded: devobj.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe |
Section loaded: fsutilext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: vcruntime140.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: vcruntime140.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Automated click: OK |
Source: C:\Users\user\Pictures\pressica.exe |
Automated click: OK |
Source: C:\Users\user\Pictures\pressica.exe |
Automated click: OK |
Source: initial sample |
Static PE information: section name: UPX0 |
Source: initial sample |
Static PE information: section name: UPX1 |
Source: initial sample |
Static PE information: section name: UPX0 |
Source: initial sample |
Static PE information: section name: UPX1 |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce VirtualBox Guest Additions Manager |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce VirtualBox Guest Additions Manager |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce VirtualBox Guest Additions Manager |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce VirtualBox Guest Additions Manager |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Evasive API call chain: CreateMutex,DecisionNodes,ExitProcess |
Source: sample-20240612.exe, 00000000.00000002.1773478268.0000000000542000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll9 |
Source: pressica.exe, 00000005.00000002.1884397923.0000000000741000.00000004.00000020.00020000.00000000.sdmp, pressica.exe, 0000000B.00000002.1968225509.00000000006A1000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\sample-20240612.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\sample-20240612.exe |
API call chain: ExitProcess graph end node |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Code function: 0_2_00402FD2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
0_2_00402FD2 |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Code function: 0_2_00402CEE SetUnhandledExceptionFilter, |
0_2_00402CEE |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Code function: 0_2_00402B8C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_00402B8C |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Memory allocated: C:\Windows\SysWOW64\mspaint.exe base: 730000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Memory allocated: C:\Windows\SysWOW64\mspaint.exe base: 3230000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Memory allocated: C:\Windows\SysWOW64\mspaint.exe base: 6E0000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Memory written: C:\Windows\SysWOW64\mspaint.exe base: 730000 |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Memory written: C:\Windows\SysWOW64\mspaint.exe base: 3230000 |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Memory written: C:\Windows\SysWOW64\mspaint.exe base: 6E0000 |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Process created: C:\Windows\SysWOW64\xcopy.exe "C:\Windows\System32\xcopy.exe" /f /y "C:\Users\user\Desktop\sample-20240612.exe" "C:\Users\user\Pictures\pressica.exe*" |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
Jump to behavior |
Source: Yara match |
File source: 00000005.00000002.1884397923.0000000000741000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000D.00000002.2980998413.00000000006E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.2980996164.0000000003230000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.2981002514.0000000000730000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1773478268.000000000052B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000B.00000002.1968225509.00000000006A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |