Click to jump to signature section
Source: 00000005.00000002.1884397923.0000000000741000.00000004.00000020.00020000.00000000.sdmp | Malware Configuration Extractor: Metasploit {"Type": "Shell Bind TCP", "Listen Port": 20} |
Source: C:\Users\user\Desktop\sample-20240612.exe | Code function: 0_2_00402450 CryptStringToBinaryA,CryptStringToBinaryA,766B3C50, | 0_2_00402450 |
Source: C:\Users\user\Desktop\sample-20240612.exe | Code function: 0_2_00401280 _fwprintf,CryptBinaryToStringA, | 0_2_00401280 |
Source: sample-20240612.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: C:\Users\user\Desktop\sample-20240612.exe | Code function: 0_2_00401580 OpenClipboard,GetClipboardData,CloseClipboard,_fwprintf,socket,htons,inet_addr,htons,GetCurrentProcessId,htons,sendto,recvfrom, | 0_2_00401580 |
Source: C:\Users\user\Desktop\sample-20240612.exe | Code function: 0_2_00401580 OpenClipboard,GetClipboardData,CloseClipboard,_fwprintf,socket,htons,inet_addr,htons,GetCurrentProcessId,htons,sendto,recvfrom, | 0_2_00401580 |
Source: C:\Users\user\Desktop\sample-20240612.exe | Code function: 0_2_00401580 OpenClipboard,GetClipboardData,CloseClipboard,_fwprintf,socket,htons,inet_addr,htons,GetCurrentProcessId,htons,sendto,recvfrom, | 0_2_00401580 |
Source: 00000005.00000002.1884397923.0000000000741000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 0000000D.00000002.2980998413.00000000006E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000007.00000002.2980996164.0000000003230000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000004.00000002.2981002514.0000000000730000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000000.00000002.1773478268.000000000052B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 0000000B.00000002.1968225509.00000000006A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: sample-20240612.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: 00000005.00000002.1884397923.0000000000741000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 0000000D.00000002.2980998413.00000000006E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000007.00000002.2980996164.0000000003230000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000004.00000002.2981002514.0000000000730000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000000.00000002.1773478268.000000000052B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 0000000B.00000002.1968225509.00000000006A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2104:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6768:120:WilError_03 |
Source: C:\Users\user\Pictures\pressica.exe | Mutant created: \Sessions\1\BaseNamedObjects\toxotidae |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3852:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7148:120:WilError_03 |
Source: unknown | Process created: C:\Users\user\Desktop\sample-20240612.exe "C:\Users\user\Desktop\sample-20240612.exe" | |
Source: C:\Users\user\Desktop\sample-20240612.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\sample-20240612.exe | Process created: C:\Windows\SysWOW64\xcopy.exe "C:\Windows\System32\xcopy.exe" /f /y "C:\Users\user\Desktop\sample-20240612.exe" "C:\Users\user\Pictures\pressica.exe*" | |
Source: C:\Windows\SysWOW64\xcopy.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\sample-20240612.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | |
Source: unknown | Process created: C:\Users\user\Pictures\pressica.exe "C:\Users\user\Pictures\pressica.exe" | |
Source: C:\Users\user\Pictures\pressica.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Pictures\pressica.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | |
Source: unknown | Process created: C:\Users\user\Pictures\pressica.exe "C:\Users\user\Pictures\pressica.exe" | |
Source: C:\Users\user\Pictures\pressica.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Pictures\pressica.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | |
Source: C:\Users\user\Desktop\sample-20240612.exe | Process created: C:\Windows\SysWOW64\xcopy.exe "C:\Windows\System32\xcopy.exe" /f /y "C:\Users\user\Desktop\sample-20240612.exe" "C:\Users\user\Pictures\pressica.exe*" | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe | Section loaded: ulib.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe | Section loaded: ifsutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe | Section loaded: fsutilext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Automated click: OK |
Source: C:\Users\user\Pictures\pressica.exe | Automated click: OK |
Source: C:\Users\user\Pictures\pressica.exe | Automated click: OK |
Source: initial sample | Static PE information: section name: UPX0 |
Source: initial sample | Static PE information: section name: UPX1 |
Source: initial sample | Static PE information: section name: UPX0 |
Source: initial sample | Static PE information: section name: UPX1 |
Source: C:\Users\user\Desktop\sample-20240612.exe | Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce VirtualBox Guest Additions Manager | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce VirtualBox Guest Additions Manager | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce VirtualBox Guest Additions Manager | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce VirtualBox Guest Additions Manager | Jump to behavior |
Source: sample-20240612.exe, 00000000.00000002.1773478268.0000000000542000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll9 |
Source: pressica.exe, 00000005.00000002.1884397923.0000000000741000.00000004.00000020.00020000.00000000.sdmp, pressica.exe, 0000000B.00000002.1968225509.00000000006A1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\sample-20240612.exe | Code function: 0_2_00402FD2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 0_2_00402FD2 |
Source: C:\Users\user\Desktop\sample-20240612.exe | Code function: 0_2_00402CEE SetUnhandledExceptionFilter, | 0_2_00402CEE |
Source: C:\Users\user\Desktop\sample-20240612.exe | Code function: 0_2_00402B8C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00402B8C |
Source: C:\Users\user\Desktop\sample-20240612.exe | Memory allocated: C:\Windows\SysWOW64\mspaint.exe base: 730000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Memory allocated: C:\Windows\SysWOW64\mspaint.exe base: 3230000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Memory allocated: C:\Windows\SysWOW64\mspaint.exe base: 6E0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Memory written: C:\Windows\SysWOW64\mspaint.exe base: 730000 | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Memory written: C:\Windows\SysWOW64\mspaint.exe base: 3230000 | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Memory written: C:\Windows\SysWOW64\mspaint.exe base: 6E0000 | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Process created: C:\Windows\SysWOW64\xcopy.exe "C:\Windows\System32\xcopy.exe" /f /y "C:\Users\user\Desktop\sample-20240612.exe" "C:\Users\user\Pictures\pressica.exe*" | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | Jump to behavior |
Source: Yara match | File source: 00000005.00000002.1884397923.0000000000741000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000D.00000002.2980998413.00000000006E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.2980996164.0000000003230000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000002.2981002514.0000000000730000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1773478268.000000000052B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000B.00000002.1968225509.00000000006A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |