Click to jump to signature section
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Code function: 0_2_00402450 strlen,CryptStringToBinaryA,CryptStringToBinaryA,free, | 0_2_00402450 |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Code function: 0_2_00401280 _fwprintf,strlen,strlen,CryptBinaryToStringA, | 0_2_00401280 |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Code function: 0_2_00401580 OpenClipboard,GetClipboardData,CloseClipboard,_strdup,strlen,_fwprintf,socket,htons,inet_addr,htons,memset,GetCurrentProcessId,htons,strlen,strlen,sendto,recvfrom,strlen, | 0_2_00401580 |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Code function: 0_2_00401580 OpenClipboard,GetClipboardData,CloseClipboard,_strdup,strlen,_fwprintf,socket,htons,inet_addr,htons,memset,GetCurrentProcessId,htons,strlen,strlen,sendto,recvfrom,strlen, | 0_2_00401580 |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Code function: 0_2_00401580 OpenClipboard,GetClipboardData,CloseClipboard,_strdup,strlen,_fwprintf,socket,htons,inet_addr,htons,memset,GetCurrentProcessId,htons,strlen,strlen,sendto,recvfrom,strlen, | 0_2_00401580 |
Source: 0000000C.00000002.3306192530.0000000002EF0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000005.00000002.3306192644.0000000002B00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000009.00000002.3306194486.0000000003290000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000007.00000002.2250921540.0000000000461000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 0000000A.00000002.2322651335.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000000.00000002.2093297747.0000000000591000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 0000000C.00000002.3306192530.0000000002EF0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000005.00000002.3306192644.0000000002B00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000009.00000002.3306194486.0000000003290000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000007.00000002.2250921540.0000000000461000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 0000000A.00000002.2322651335.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: 00000000.00000002.2093297747.0000000000591000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_a6e956c9 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 21855599bc51ec2f71d694d4e0f866f815efe54a42842dfe5f8857811530a686, id = a6e956c9-799e-49f9-b5c5-ac68aaa2dc21, last_modified = 2021-08-23 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1988:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6184:120:WilError_03 |
Source: C:\Users\user\Pictures\pressica.exe | Mutant created: \Sessions\1\BaseNamedObjects\toxotidae |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5960:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4072:120:WilError_03 |
Source: unknown | Process created: C:\Users\user\Desktop\sample-20240612-unpacked.exe "C:\Users\user\Desktop\sample-20240612-unpacked.exe" | |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Process created: C:\Windows\SysWOW64\xcopy.exe "C:\Windows\System32\xcopy.exe" /f /y "C:\Users\user\Desktop\sample-20240612-unpacked.exe" "C:\Users\user\Pictures\pressica.exe*" | |
Source: C:\Windows\SysWOW64\xcopy.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | |
Source: unknown | Process created: C:\Users\user\Pictures\pressica.exe "C:\Users\user\Pictures\pressica.exe" | |
Source: C:\Users\user\Pictures\pressica.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Pictures\pressica.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | |
Source: unknown | Process created: C:\Users\user\Pictures\pressica.exe "C:\Users\user\Pictures\pressica.exe" | |
Source: C:\Users\user\Pictures\pressica.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Pictures\pressica.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Process created: C:\Windows\SysWOW64\xcopy.exe "C:\Windows\System32\xcopy.exe" /f /y "C:\Users\user\Desktop\sample-20240612-unpacked.exe" "C:\Users\user\Pictures\pressica.exe*" | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe | Section loaded: ulib.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe | Section loaded: ifsutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe | Section loaded: fsutilext.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\xcopy.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Automated click: OK |
Source: C:\Users\user\Pictures\pressica.exe | Automated click: OK |
Source: C:\Users\user\Pictures\pressica.exe | Automated click: OK |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Code function: 0_2_00401EA0 LoadLibraryA,GetProcAddress,RegCreateKeyExA,GetProcAddress,strlen,RegSetValueExA, | 0_2_00401EA0 |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce VirtualBox Guest Additions Manager | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce VirtualBox Guest Additions Manager | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce VirtualBox Guest Additions Manager | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce VirtualBox Guest Additions Manager | Jump to behavior |
Source: sample-20240612-unpacked.exe, 00000000.00000002.2093297747.00000000005B8000.00000004.00000020.00020000.00000000.sdmp, pressica.exe, 00000007.00000002.2250921540.0000000000461000.00000004.00000020.00020000.00000000.sdmp, pressica.exe, 0000000A.00000002.2322651335.00000000006F1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Code function: 0_2_00402B8C IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00402B8C |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Code function: 0_2_00401EA0 LoadLibraryA,GetProcAddress,RegCreateKeyExA,GetProcAddress,strlen,RegSetValueExA, | 0_2_00401EA0 |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Code function: 0_2_00402FD2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 0_2_00402FD2 |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Code function: 0_2_00402CEE SetUnhandledExceptionFilter, | 0_2_00402CEE |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Code function: 0_2_00402B8C IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_00402B8C |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Memory allocated: C:\Windows\SysWOW64\mspaint.exe base: 2B00000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Memory allocated: C:\Windows\SysWOW64\mspaint.exe base: 3290000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Memory allocated: C:\Windows\SysWOW64\mspaint.exe base: 2EF0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Process created: C:\Windows\SysWOW64\xcopy.exe "C:\Windows\System32\xcopy.exe" /f /y "C:\Users\user\Desktop\sample-20240612-unpacked.exe" "C:\Users\user\Pictures\pressica.exe*" | Jump to behavior |
Source: C:\Users\user\Desktop\sample-20240612-unpacked.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | Jump to behavior |
Source: C:\Users\user\Pictures\pressica.exe | Process created: C:\Windows\SysWOW64\mspaint.exe mspaint.exe | Jump to behavior |
Source: Yara match | File source: 0000000C.00000002.3306192530.0000000002EF0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.3306192644.0000000002B00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000009.00000002.3306194486.0000000003290000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.2250921540.0000000000461000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 0000000A.00000002.2322651335.00000000006F1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2093297747.0000000000591000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |