Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe

Overview

General Information

Sample name:payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe
Analysis ID:1574583
MD5:81e3a6ecdcf4409ccfa9a5c4367f6021
SHA1:69a81988bde874bbc631173a7f1805310e96dfb5
SHA256:3c7d0dcd37064458fa110cade991501ff6f499d495a8eb43a0847da41d060445
Tags:exeMetasploituser-lontze7
Infos:

Detection

Metasploit
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
Machine Learning detection for sample
Sigma detected: Potentially Suspicious Malware Callback Communication
Detected TCP or UDP traffic on non-standard ports
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cleanup
{"Type": "Metasploit Connect", "IP": "178.238.231.204", "Port": 4444}
SourceRuleDescriptionAuthorStrings
payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
      payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeWindows_Trojan_Metasploit_96233b6bIdentifies another 64 bit API hashing function used by Metasploit.unknown
      • 0x9acf:$a: 89 E5 31 D2 64 8B 52 30 8B 52 0C 8B 52 14 8B 72 28 31 FF 0F B7 4A 26 31 C0 AC 3C 61 7C 02 2C 20 C1 CF 0D
      payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
      • 0x9ba0:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
        00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_96233b6bIdentifies another 64 bit API hashing function used by Metasploit.unknown
        • 0x7:$a: 89 E5 31 D2 64 8B 52 30 8B 52 0C 8B 52 14 8B 72 28 31 FF 0F B7 4A 26 31 C0 AC 3C 61 7C 02 2C 20 C1 CF 0D
        00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
        • 0xd8:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
        00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
          00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_96233b6bIdentifies another 64 bit API hashing function used by Metasploit.unknown
          • 0x8acf:$a: 89 E5 31 D2 64 8B 52 30 8B 52 0C 8B 52 14 8B 72 28 31 FF 0F B7 4A 26 31 C0 AC 3C 61 7C 02 2C 20 C1 CF 0D
          Click to see the 4 entries
          SourceRuleDescriptionAuthorStrings
          0.0.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
            0.0.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
              0.0.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpackWindows_Trojan_Metasploit_96233b6bIdentifies another 64 bit API hashing function used by Metasploit.unknown
              • 0x9acf:$a: 89 E5 31 D2 64 8B 52 30 8B 52 0C 8B 52 14 8B 72 28 31 FF 0F B7 4A 26 31 C0 AC 3C 61 7C 02 2C 20 C1 CF 0D
              0.0.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpackWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
              • 0x9ba0:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
              0.2.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
                Click to see the 3 entries

                System Summary

                barindex
                Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DesusertionIp: 178.238.231.204, DesusertionIsIpv6: false, DesusertionPort: 4444, EventID: 3, Image: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe, Initiated: true, ProcessId: 7520, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 49712
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeAvira: detected
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "178.238.231.204", "Port": 4444}
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeReversingLabs: Detection: 86%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeJoe Sandbox ML: detected
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe
                Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeCode function: 4x nop then not dword ptr [eax-6F6F6F39h]0_2_0040A430
                Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeCode function: 4x nop then push ebp0_2_004048F5
                Source: global trafficTCP traffic: 192.168.2.9:49712 -> 178.238.231.204:4444
                Source: Joe Sandbox ViewASN Name: CONTABODE CONTABODE
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: unknownTCP traffic detected without corresponding DNS query: 178.238.231.204
                Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeCode function: 0_2_00480095 WSASocketA,connect,recv,closesocket,0_2_00480095
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeString found in binary or memory: http://www.apache.org/
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeString found in binary or memory: http://www.zeustech.net/

                System Summary

                barindex
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe, type: SAMPLEMatched rule: Identifies another 64 bit API hashing function used by Metasploit. Author: unknown
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe, type: SAMPLEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                Source: 0.0.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies another 64 bit API hashing function used by Metasploit. Author: unknown
                Source: 0.0.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                Source: 0.2.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies another 64 bit API hashing function used by Metasploit. Author: unknown
                Source: 0.2.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                Source: 00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies another 64 bit API hashing function used by Metasploit. Author: unknown
                Source: 00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                Source: 00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies another 64 bit API hashing function used by Metasploit. Author: unknown
                Source: 00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                Source: 00000000.00000000.1352180995.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies another 64 bit API hashing function used by Metasploit. Author: unknown
                Source: 00000000.00000000.1352180995.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe, 00000000.00000000.1352238009.0000000000415000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameab.exeF vs payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeBinary or memory string: OriginalFilenameab.exeF vs payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_96233b6b reference_sample = e7a2d966deea3a2df6ce1aeafa8c2caa753824215a8368e0a96b394fb46b753b, os = windows, severity = x86, description = Identifies another 64 bit API hashing function used by Metasploit., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 40032849674714bc9eb020971dd9f27a07b53b8ff953b793cb3aad136256fd70, id = 96233b6b-d95a-4e0e-8f83-f2282a342087, last_modified = 2021-08-23
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                Source: 0.0.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_96233b6b reference_sample = e7a2d966deea3a2df6ce1aeafa8c2caa753824215a8368e0a96b394fb46b753b, os = windows, severity = x86, description = Identifies another 64 bit API hashing function used by Metasploit., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 40032849674714bc9eb020971dd9f27a07b53b8ff953b793cb3aad136256fd70, id = 96233b6b-d95a-4e0e-8f83-f2282a342087, last_modified = 2021-08-23
                Source: 0.0.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                Source: 0.2.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_96233b6b reference_sample = e7a2d966deea3a2df6ce1aeafa8c2caa753824215a8368e0a96b394fb46b753b, os = windows, severity = x86, description = Identifies another 64 bit API hashing function used by Metasploit., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 40032849674714bc9eb020971dd9f27a07b53b8ff953b793cb3aad136256fd70, id = 96233b6b-d95a-4e0e-8f83-f2282a342087, last_modified = 2021-08-23
                Source: 0.2.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                Source: 00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_96233b6b reference_sample = e7a2d966deea3a2df6ce1aeafa8c2caa753824215a8368e0a96b394fb46b753b, os = windows, severity = x86, description = Identifies another 64 bit API hashing function used by Metasploit., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 40032849674714bc9eb020971dd9f27a07b53b8ff953b793cb3aad136256fd70, id = 96233b6b-d95a-4e0e-8f83-f2282a342087, last_modified = 2021-08-23
                Source: 00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                Source: 00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_96233b6b reference_sample = e7a2d966deea3a2df6ce1aeafa8c2caa753824215a8368e0a96b394fb46b753b, os = windows, severity = x86, description = Identifies another 64 bit API hashing function used by Metasploit., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 40032849674714bc9eb020971dd9f27a07b53b8ff953b793cb3aad136256fd70, id = 96233b6b-d95a-4e0e-8f83-f2282a342087, last_modified = 2021-08-23
                Source: 00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                Source: 00000000.00000000.1352180995.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_96233b6b reference_sample = e7a2d966deea3a2df6ce1aeafa8c2caa753824215a8368e0a96b394fb46b753b, os = windows, severity = x86, description = Identifies another 64 bit API hashing function used by Metasploit., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 40032849674714bc9eb020971dd9f27a07b53b8ff953b793cb3aad136256fd70, id = 96233b6b-d95a-4e0e-8f83-f2282a342087, last_modified = 2021-08-23
                Source: 00000000.00000000.1352180995.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: classification engineClassification label: mal100.troj.winEXE@1/0@0/1
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeReversingLabs: Detection: 86%
                Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeSection loaded: mswsock.dllJump to behavior
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe
                Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeCode function: 0_2_00402842 push edx; ret 0_2_00402846
                Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeCode function: 0_2_0040124A push eax; ret 0_2_00401253
                Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeCode function: 0_2_00405E4E push ecx; iretd 0_2_00405E54
                Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeCode function: 0_2_00405E50 push ecx; iretd 0_2_00405E54
                Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeCode function: 0_2_004026DD push FFFFFF93h; retf 0_2_004026FE
                Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeCode function: 0_2_004030E0 push ebp; retf 0_2_00403161
                Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeCode function: 0_2_004026E3 push FFFFFF93h; retf 0_2_004026FE
                Source: C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeCode function: 0_2_00403909 push es; ret 0_2_00403916
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeStatic PE information: section name: .text entropy: 7.017916789789544
                Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                Source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe, 00000000.00000002.1586614650.00000000004BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.1352180995.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                1
                DLL Side-Loading
                2
                Software Packing
                OS Credential Dumping1
                Security Software Discovery
                Remote ServicesData from Local System1
                Non-Standard Port
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                DLL Side-Loading
                LSASS Memory1
                System Information Discovery
                Remote Desktop ProtocolData from Removable Media1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                Obfuscated Files or Information
                Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe87%ReversingLabsWin32.Backdoor.Swrort
                payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe100%AviraTR/Patched.Gen2
                payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                s-part-0035.t-0009.t-msedge.net
                13.107.246.63
                truefalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.apache.org/licenses/LICENSE-2.0payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exefalse
                    high
                    http://www.apache.org/payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exefalse
                      high
                      http://www.zeustech.net/payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exefalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        178.238.231.204
                        unknownGermany
                        51167CONTABODEtrue
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1574583
                        Start date and time:2024-12-13 12:38:24 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 2m 41s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:5
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe
                        Detection:MAL
                        Classification:mal100.troj.winEXE@1/0@0/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 71%
                        • Number of executed functions: 1
                        • Number of non-executed functions: 2
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Stop behavior analysis, all processes terminated
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                        • Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.12.23.50
                        • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • VT rate limit hit for: payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe
                        No simulations
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        s-part-0035.t-0009.t-msedge.netClient.exeGet hashmaliciousNjratBrowse
                        • 13.107.246.63
                        beacon_x64.exeGet hashmaliciousCobaltStrikeBrowse
                        • 13.107.246.63
                        BWCStartMSI.exeGet hashmaliciousUnknownBrowse
                        • 13.107.246.63
                        kiyan.exeGet hashmaliciousRedLineBrowse
                        • 13.107.246.63
                        AsyncClient.exeGet hashmaliciousAsyncRATBrowse
                        • 13.107.246.63
                        main.exeGet hashmaliciousAsyncRATBrowse
                        • 13.107.246.63
                        RMX.exeGet hashmaliciousRemcosBrowse
                        • 13.107.246.63
                        https://e.trustifi.com/#/fff2a6/34074b/38c75f/bf3fbd/0d1c47/12c665/f3cdcd/c1be48/e8666a/ef542d/85972d/627493/9a11d6/1f4096/1d247f/d08b7b/9066d9/86c9f0/b1ff53/224fc1/c5dff5/a64e02/f00a15/3cdbea/a78615/4ddb76/30d9f7/98e1a2/9412cb/8e2651/8d4e63/9d313b/2f0213/ae3252/642e4a/6f0b2e/306b49/fd8e03/84bfef/0da4e6/6224c1/902b5e/e0d84c/badeba/3e52c1/94282a/975221/7a2e92/514659/ae5bab/957b7b/eb9e61/6942c6/d917d9/44a5ae/e58297/02048a/55f177/dca75c/c46e68/ac781c/5b787b/abcd53/568132/1d514a/5290de/d0b524/7d0cb6/e4e8bf/2ff215/1ddb69/add914/7674bb/dc5d9b/8fc829/561052/f5a816/40ee64/a0bcf5/b0cc13/8e70a5/255ef2/b24b8d/81e09f/4c70dd/5bbaa4/7ff26c/f1999b/4a2515/4a3a04/0a188eGet hashmaliciousUnknownBrowse
                        • 13.107.246.63
                        41a1111.hta.exeGet hashmaliciousUnknownBrowse
                        • 13.107.246.63
                        3181425fa7464801a03868a1adf86bc1.ps1Get hashmaliciousUnknownBrowse
                        • 13.107.246.63
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        CONTABODERFQ3978 39793980.pdf.exeGet hashmaliciousFormBookBrowse
                        • 161.97.142.144
                        ORDER-401.exeGet hashmaliciousFormBookBrowse
                        • 161.97.142.144
                        SHIPPING DOCUMENTS_PDF.exeGet hashmaliciousFormBookBrowse
                        • 161.97.142.144
                        PO2412010.exeGet hashmaliciousFormBookBrowse
                        • 161.97.142.144
                        MAERSK LINE SHIPPING DOC_4253.exeGet hashmaliciousFormBookBrowse
                        • 161.97.142.144
                        Need Price Order No.17084 PARLOK.exeGet hashmaliciousFormBookBrowse
                        • 161.97.168.245
                        lgkWBwqY15.exeGet hashmaliciousFormBookBrowse
                        • 161.97.168.245
                        New quotation request.exeGet hashmaliciousFormBookBrowse
                        • 161.97.168.245
                        UPDATED CONTRACT.exeGet hashmaliciousFormBookBrowse
                        • 161.97.168.245
                        sora.m68k.elfGet hashmaliciousMiraiBrowse
                        • 167.86.111.146
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.31559411709811
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe
                        File size:77'898 bytes
                        MD5:81e3a6ecdcf4409ccfa9a5c4367f6021
                        SHA1:69a81988bde874bbc631173a7f1805310e96dfb5
                        SHA256:3c7d0dcd37064458fa110cade991501ff6f499d495a8eb43a0847da41d060445
                        SHA512:2cdee3b9ece8389e02412846a1b7fd2697da5185f985278fd17a240f35c411392d34786677b9ca6b35e860040771a1090a96fb7c9b8bdfd1a44b3ad59d15a78b
                        SSDEEP:1536:IjTxquYRiKSnmni/Lo4D2xMb+KR0Nc8Qstq3SwVcll:wTxquyamnWee0Nc8Qs2SqYl
                        TLSH:E573A042D5C45021D262123E27753BB9AA74F5FB3606C29A798CCD96EFD18B0933B3C6
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...Y...Y...Y...E...Y..TE...Y...F...Y...F...Y...Y...Y..TQ...Y...z...Y..._...Y..Rich.Y..................PE..L....B.I...........
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x40a580
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:
                        Time Stamp:0x49E642E8 [Wed Apr 15 20:26:16 2009 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:481f47bbb2c9c21e108d65f52b04c448
                        Instruction
                        xchg eax, ecx
                        std
                        inc edx
                        clc
                        inc edx
                        nop
                        cdq
                        clc
                        inc ebx
                        dec eax
                        cdq
                        wait
                        dec eax
                        aas
                        xchg eax, ebx
                        dec ecx
                        inc ebx
                        cld
                        salc
                        wait
                        cdq
                        clc
                        lahf
                        cmc
                        dec eax
                        xchg eax, ecx
                        inc ecx
                        inc ecx
                        inc ecx
                        salc
                        std
                        inc ebx
                        cld
                        dec edx
                        aaa
                        inc eax
                        inc edx
                        xchg eax, edx
                        das
                        clc
                        cld
                        dec ecx
                        xchg eax, ecx
                        xchg eax, ebx
                        dec eax
                        aaa
                        aaa
                        clc
                        aaa
                        aaa
                        salc
                        xchg eax, ebx
                        cwde
                        dec edx
                        xchg eax, ebx
                        wait
                        aaa
                        cwde
                        cmc
                        wait
                        dec edx
                        dec eax
                        nop
                        xchg eax, ecx
                        cmc
                        cmc
                        cld
                        dec ebx
                        dec ebx
                        cmc
                        das
                        cdq
                        aaa
                        inc edx
                        inc ecx
                        inc eax
                        cdq
                        dec edx
                        dec ebx
                        cwde
                        xchg eax, ebx
                        clc
                        inc ecx
                        jmp 00007F0F31677036h
                        pop ebp
                        add al, byte ptr [ebp+45C257DBh]
                        cld
                        xchg eax, edx
                        add byte ptr [esi-74648300h], bh
                        xor byte ptr [eax+edi], cl
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc76c0x78.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x1558.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0xc1e00x1c.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0xc0000x1e0.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000xa9660xb000c73e97fa513ba0462914011cd86a723eFalse0.8159623579545454data7.017916789789544IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0xc0000xfe60x100009d61d811b3b9ec811bfb805026bee62False0.462646484375DOS executable (COM, 0x8C-variant)5.3180913238666525IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xd0000x705c0x4000283b5f792323d57b9db4d2bcc46580f8False0.25634765625Matlab v4 mat-file (little endian) d, numeric, rows 0, columns 04.407841023203495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x150000x15580x2000facba160040c5783a25f6936cacda76dFalse0.2615966796875data3.7491333459464835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_VERSION0x150a00x768dataEnglishUnited States0.40189873417721517
                        RT_MANIFEST0x158080xd50XML 1.0 document, ASCII text, with CRLF line terminators0.3823356807511737
                        DLLImport
                        MSVCRT.dll_iob, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __p___initenv, _XcptFilter, _exit, _onexit, __dllonexit, strrchr, wcsncmp, _close, wcslen, wcscpy, strerror, modf, strspn, realloc, __p__environ, __p__wenviron, _errno, free, strncmp, strstr, strncpy, _ftol, qsort, fopen, perror, fclose, fflush, calloc, malloc, signal, printf, _isctype, atoi, exit, __mb_cur_max, _pctype, strchr, fprintf, _controlfp, _strdup, _strnicmp
                        KERNEL32.dllPeekNamedPipe, ReadFile, WriteFile, LoadLibraryA, GetProcAddress, GetVersionExA, GetExitCodeProcess, TerminateProcess, LeaveCriticalSection, SetEvent, ReleaseMutex, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, CreateMutexA, GetFileType, SetLastError, FreeEnvironmentStringsW, GetEnvironmentStringsW, GlobalFree, GetCommandLineW, TlsAlloc, TlsFree, DuplicateHandle, GetCurrentProcess, SetHandleInformation, CloseHandle, GetSystemTimeAsFileTime, FileTimeToSystemTime, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, Sleep, FormatMessageA, GetLastError, WaitForSingleObject, CreateEventA, SetStdHandle, SetFilePointer, CreateFileA, CreateFileW, GetOverlappedResult, DeviceIoControl, GetFileInformationByHandle, LocalFree
                        ADVAPI32.dllFreeSid, AllocateAndInitializeSid
                        WSOCK32.dllgetsockopt, connect, htons, gethostbyname, ntohl, inet_ntoa, setsockopt, socket, closesocket, select, ioctlsocket, __WSAFDIsSet, WSAStartup, WSACleanup, WSAGetLastError
                        WS2_32.dllWSARecv, WSASend
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 13, 2024 12:39:17.030013084 CET497124444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:17.149974108 CET444449712178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:17.150062084 CET497124444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:19.357647896 CET444449712178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:19.357713938 CET497124444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:19.358184099 CET497124444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:19.359327078 CET497184444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:19.477984905 CET444449712178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:19.479072094 CET444449718178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:19.479152918 CET497184444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:21.686024904 CET444449718178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:21.686142921 CET497184444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:21.688791037 CET497184444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:21.689677954 CET497254444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:21.808974028 CET444449718178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:21.809737921 CET444449725178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:21.809830904 CET497254444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:24.014225006 CET444449725178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:24.014338970 CET497254444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:24.014844894 CET497254444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:24.015691996 CET497314444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:24.134761095 CET444449725178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:24.135560036 CET444449731178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:24.135675907 CET497314444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:26.342417002 CET444449731178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:26.342488050 CET497314444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:26.343811035 CET497314444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:26.344715118 CET497414444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:26.560434103 CET444449731178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:26.560456038 CET444449741178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:26.560575008 CET497414444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:28.765059948 CET444449741178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:28.765156984 CET497414444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:28.765602112 CET497414444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:28.766469002 CET497474444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:28.885276079 CET444449741178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:28.886267900 CET444449747178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:28.886368036 CET497474444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:31.093297005 CET444449747178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:31.093441963 CET497474444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:31.094021082 CET497474444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:31.094836950 CET497534444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:31.225908041 CET444449747178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:31.225929976 CET444449753178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:31.226093054 CET497534444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:33.438255072 CET444449753178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:33.438325882 CET497534444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:33.438914061 CET497534444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:33.439984083 CET497604444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:33.558667898 CET444449753178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:33.559784889 CET444449760178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:33.559853077 CET497604444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:35.765592098 CET444449760178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:35.765674114 CET497604444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:35.766057968 CET497604444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:35.766889095 CET497664444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:35.887728930 CET444449760178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:35.888492107 CET444449766178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:35.888581038 CET497664444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:38.093672991 CET444449766178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:38.093756914 CET497664444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:38.094186068 CET497664444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:38.095144987 CET497724444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:38.214096069 CET444449766178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:38.215025902 CET444449772178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:38.215111017 CET497724444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:40.422549963 CET444449772178.238.231.204192.168.2.9
                        Dec 13, 2024 12:39:40.422692060 CET497724444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:40.423110962 CET497724444192.168.2.9178.238.231.204
                        Dec 13, 2024 12:39:40.542953968 CET444449772178.238.231.204192.168.2.9
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Dec 13, 2024 12:39:12.179399014 CET1.1.1.1192.168.2.90xdfabNo error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                        Dec 13, 2024 12:39:12.179399014 CET1.1.1.1192.168.2.90xdfabNo error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:06:39:16
                        Start date:13/12/2024
                        Path:C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exe"
                        Imagebase:0x400000
                        File size:77'898 bytes
                        MD5 hash:81E3A6ECDCF4409CCFA9A5C4367F6021
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Metasploit_96233b6b, Description: Identifies another 64 bit API hashing function used by Metasploit., Source: 00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                        • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                        • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Metasploit_96233b6b, Description: Identifies another 64 bit API hashing function used by Metasploit., Source: 00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                        • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                        • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000000.1352180995.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Metasploit_96233b6b, Description: Identifies another 64 bit API hashing function used by Metasploit., Source: 00000000.00000000.1352180995.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                        • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000000.1352180995.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                        Reputation:low
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:1.2%
                          Dynamic/Decrypted Code Coverage:28.6%
                          Signature Coverage:22.9%
                          Total number of Nodes:35
                          Total number of Limit Nodes:3
                          execution_graph 973 4048b0 free 982 405d20 984 405d17 982->984 983 405db3 GetEnvironmentStringsW 984->982 984->983 974 405f64 975 405f69 974->975 976 405fd0 WSACleanup 975->976 977 405f78 975->977 976->977 978 406b14 979 40b540 978->979 980 406b3c SystemTimeToTzSpecificLocalTime 979->980 981 406b8e 980->981 958 402a26 959 402a2c 958->959 962 405290 959->962 963 402a71 962->963 964 40529f 962->964 965 4052a5 free 964->965 965->963 965->965 946 480000 949 480095 946->949 948 480006 948->948 950 4800aa 949->950 951 4800bc WSASocketA 950->951 952 4800d8 connect 951->952 953 4800f1 recv 952->953 955 4800e7 952->955 954 480139 closesocket 953->954 953->955 954->951 954->955 955->952 955->953 955->954 956 480157 955->956 956->948 967 405cd8 969 405d01 GetEnvironmentStringsW 967->969 966 405e2c SetLastError 970 4048ad 971 4048b0 free 970->971 972 4030ae fclose 957 40120f atoi

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 480095-4800ba 3 4800bc-4800d7 WSASocketA 0->3 4 4800d8-4800e5 connect 3->4 5 4800f1-480101 recv 4->5 6 4800e7-4800ea 4->6 8 480139-480146 closesocket 5->8 9 480103-480117 5->9 6->4 7 4800ec call 480158 6->7 7->5 8->3 10 48014c 8->10 13 480118-480127 9->13 10->7 15 480129-480132 13->15 16 480151-480155 13->16 15->8 16->13 17 480157 16->17
                          APIs
                          • WSASocketA.WS2_32(E0DF0FEA,00000002,00000001,00000000,00000000,00000000,00000000,5C110002,CCE7EEB2,0000000A,?,?,5F327377,00003233), ref: 004800D5
                          • connect.WS2_32(6174A599,?,?,00000010,?,?,5F327377,00003233), ref: 004800E1
                          • recv.WS2_32(5FC8D902,?,?,00000004,00000000,?,?,00000010,?,?,5F327377,00003233), ref: 004800FC
                          • closesocket.WS2_32(614D6E75,?,?,?,00000004,00000000,?,?,00000010,?,?,5F327377,00003233), ref: 0048013F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1586603024.0000000000480000.00000040.00001000.00020000.00000000.sdmp, Offset: 00480000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_480000_payload-c17f7df6-cf80-43d5-8c60-eca90366debb.jbxd
                          Yara matches
                          Similarity
                          • API ID: Socketclosesocketconnectrecv
                          • String ID:
                          • API String ID: 2083937939-0
                          • Opcode ID: df7ff89cbc9d9fd407bde0306c32199cf95f4a511d8ba031123245f3ef825462
                          • Instruction ID: b8e8a39a777acc1d81ba538b2e04841cedbd8ac533aa6faa2d020234aadea12f
                          • Opcode Fuzzy Hash: df7ff89cbc9d9fd407bde0306c32199cf95f4a511d8ba031123245f3ef825462
                          • Instruction Fuzzy Hash: BB11A5B06902583EF57032669C0BF7B291CCF427A4F104826BB45EA1C1C596DC4882FE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1586498342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1586523889.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1586535807.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1586551199.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_payload-c17f7df6-cf80-43d5-8c60-eca90366debb.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: A
                          • API String ID: 0-3554254475
                          • Opcode ID: cd963d15c9bc87a9977af50d385d11d3f0bfa41e3ea99f658c6e184faa1cb9ba
                          • Instruction ID: 28e762d6b48d38670dcdfdc0dc9e64ee7dc4d49cc9c5684528b37d0486ef6302
                          • Opcode Fuzzy Hash: cd963d15c9bc87a9977af50d385d11d3f0bfa41e3ea99f658c6e184faa1cb9ba
                          • Instruction Fuzzy Hash: 45F0E960949384CFC3055E349C4D591BBF4AF43220F1956AED8D0D70F3D3A8C409824A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1586510353.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1586498342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1586523889.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1586535807.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1586551199.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_payload-c17f7df6-cf80-43d5-8c60-eca90366debb.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cd055bff7be2e300a8fd51509f753c530503b41d24828c9f2025d1ebfc8b122e
                          • Instruction ID: 7265c138f05c1642655874247f02cb0908b1629c827ac54b7497f9d59125ab33
                          • Opcode Fuzzy Hash: cd055bff7be2e300a8fd51509f753c530503b41d24828c9f2025d1ebfc8b122e
                          • Instruction Fuzzy Hash: FCC09B76D971185589555D4458C15F7F3B5F333711770B415E45163142CB04F0075119