Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Code function: 0_2_00402450 strlen,CryptStringToBinaryA,CryptStringToBinaryA,free, |
0_2_00402450 |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Code function: 0_2_00401280 _fwprintf,strlen,strlen,CryptBinaryToStringA, |
0_2_00401280 |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Code function: 0_2_00401580 OpenClipboard,GetClipboardData,CloseClipboard,_strdup,strlen,_fwprintf,socket,htons,inet_addr,htons,memset,GetCurrentProcessId,htons,strlen,strlen,sendto,recvfrom,strlen, |
0_2_00401580 |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Code function: 0_2_00401580 OpenClipboard,GetClipboardData,CloseClipboard,_strdup,strlen,_fwprintf,socket,htons,inet_addr,htons,memset,GetCurrentProcessId,htons,strlen,strlen,sendto,recvfrom,strlen, |
0_2_00401580 |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Code function: 0_2_00401580 OpenClipboard,GetClipboardData,CloseClipboard,_strdup,strlen,_fwprintf,socket,htons,inet_addr,htons,memset,GetCurrentProcessId,htons,strlen,strlen,sendto,recvfrom,strlen, |
0_2_00401580 |
Source: 0000000C.00000002.3306192530.0000000002EF0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000005.00000002.3306192644.0000000002B00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000009.00000002.3306194486.0000000003290000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000007.00000002.2250921540.0000000000461000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 0000000A.00000002.2322651335.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000000.00000002.2093297747.0000000000591000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 0000000C.00000002.3306192530.0000000002EF0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000005.00000002.3306192644.0000000002B00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000009.00000002.3306194486.0000000003290000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000007.00000002.2250921540.0000000000461000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 0000000A.00000002.2322651335.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000000.00000002.2093297747.0000000000591000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1988:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6184:120:WilError_03 |
Source: C:\Users\user\Pictures\pressica.exe |
Mutant created: \Sessions\1\BaseNamedObjects\toxotidae |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5960:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4072:120:WilError_03 |
Source: unknown |
Process created: C:\Users\user\Desktop\sample-20240612-unpacked.exe "C:\Users\user\Desktop\sample-20240612-unpacked.exe" |
|
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Process created: C:\Windows\SysWOW64\xcopy.exe "C:\Windows\System32\xcopy.exe" /f /y "C:\Users\user\Desktop\sample-20240612-unpacked.exe" "C:\Users\user\Pictures\pressica.exe*" |
|
Source: C:\Windows\SysWOW64\xcopy.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
|
Source: unknown |
Process created: C:\Users\user\Pictures\pressica.exe "C:\Users\user\Pictures\pressica.exe" |
|
Source: C:\Users\user\Pictures\pressica.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Pictures\pressica.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
|
Source: unknown |
Process created: C:\Users\user\Pictures\pressica.exe "C:\Users\user\Pictures\pressica.exe" |
|
Source: C:\Users\user\Pictures\pressica.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Pictures\pressica.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
|
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Process created: C:\Windows\SysWOW64\xcopy.exe "C:\Windows\System32\xcopy.exe" /f /y "C:\Users\user\Desktop\sample-20240612-unpacked.exe" "C:\Users\user\Pictures\pressica.exe*" |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: vcruntime140.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe |
Section loaded: ulib.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe |
Section loaded: ifsutil.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe |
Section loaded: devobj.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe |
Section loaded: fsutilext.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: vcruntime140.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: vcruntime140.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce VirtualBox Guest Additions Manager |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce VirtualBox Guest Additions Manager |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce VirtualBox Guest Additions Manager |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce VirtualBox Guest Additions Manager |
Jump to behavior |
Source: sample-20240612-unpacked.exe, 00000000.00000002.2093297747.00000000005B8000.00000004.00000020.00020000.00000000.sdmp, pressica.exe, 00000007.00000002.2250921540.0000000000461000.00000004.00000020.00020000.00000000.sdmp, pressica.exe, 0000000A.00000002.2322651335.00000000006F1000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Code function: 0_2_00402B8C IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_00402B8C |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Code function: 0_2_00402FD2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, |
0_2_00402FD2 |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Code function: 0_2_00402CEE SetUnhandledExceptionFilter, |
0_2_00402CEE |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Code function: 0_2_00402B8C IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, |
0_2_00402B8C |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Memory allocated: C:\Windows\SysWOW64\mspaint.exe base: 2B00000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Memory allocated: C:\Windows\SysWOW64\mspaint.exe base: 3290000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Memory allocated: C:\Windows\SysWOW64\mspaint.exe base: 2EF0000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Process created: C:\Windows\SysWOW64\xcopy.exe "C:\Windows\System32\xcopy.exe" /f /y "C:\Users\user\Desktop\sample-20240612-unpacked.exe" "C:\Users\user\Pictures\pressica.exe*" |
Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe |
Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe |
Jump to behavior |
Source: Yara match |
File source: 0000000C.00000002.3306192530.0000000002EF0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.3306192644.0000000002B00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000009.00000002.3306194486.0000000003290000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000007.00000002.2250921540.0000000000461000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 0000000A.00000002.2322651335.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.2093297747.0000000000591000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |