Create Interactive Tour

Windows Analysis Report
template.pdf

Overview

General Information

Sample Name:template.pdf (renamed file extension from pdf to exe)
Analysis ID:573251
MD5:7b478a52e723de424790f4c0b0658c11
SHA1:39ebd7b22d816c9fa2690353a4d334e80a2ca909
SHA256:7e1c7bf2d20218ca328153ee8a0889ca7938dc030c7139efd28845d8c0b54ccf
Infos:

Detection

Metasploit
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Yara detected Metasploit Payload
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Machine Learning detection for sample
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Found inlined nop instructions (likely shell or obfuscated code)
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Opens a port and listens for incoming connection (possibly a backdoor)
Program does not show much activity (idle)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • template.exe (PID: 5684 cmdline: "C:\Users\user\Desktop\template.exe" MD5: 7B478A52E723DE424790F4C0B0658C11)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
template.exeMsfpayloads_msf_10Metasploit Payloads - file msf.exeFlorian Roth
  • 0x6e90:$s1: 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF AC 3C 61
  • 0x6ed2:$s2: 01 C7 38 E0 75 F6 03 7D F8 3B 7D 24 75 E4 58 8B
  • 0x6ef2:$s3: 01 D0 89 44 24 24 5B 5B 61 59 5A 51 FF E0 5F 5F
template.exeJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
    SourceRuleDescriptionAuthorStrings
    1.0.template.exe.400000.0.unpackMsfpayloads_msf_10Metasploit Payloads - file msf.exeFlorian Roth
    • 0x6e90:$s1: 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF AC 3C 61
    • 0x6ed2:$s2: 01 C7 38 E0 75 F6 03 7D F8 3B 7D 24 75 E4 58 8B
    • 0x6ef2:$s3: 01 D0 89 44 24 24 5B 5B 61 59 5A 51 FF E0 5F 5F
    1.0.template.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
      1.2.template.exe.400000.0.unpackMsfpayloads_msf_10Metasploit Payloads - file msf.exeFlorian Roth
      • 0x6e90:$s1: 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF AC 3C 61
      • 0x6ed2:$s2: 01 C7 38 E0 75 F6 03 7D F8 3B 7D 24 75 E4 58 8B
      • 0x6ef2:$s3: 01 D0 89 44 24 24 5B 5B 61 59 5A 51 FF E0 5F 5F
      1.2.template.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
        No Sigma rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: template.exeAvira: detected
        Source: template.exeVirustotal: Detection: 84%Perma Link
        Source: template.exeReversingLabs: Detection: 88%
        Source: template.exeJoe Sandbox ML: detected
        Source: 1.2.template.exe.400000.0.unpackAvira: Label: TR/Patched.Gen2
        Source: 1.0.template.exe.400000.0.unpackAvira: Label: TR/Patched.Gen2
        Source: template.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: C:\Users\user\Desktop\template.exeSocket bind: port: 53Jump to behavior
        Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: template.exe
        Source: C:\Users\user\Desktop\template.exeCode function: 4x nop then pop ebp1_2_004055D0
        Source: template.exeString found in binary or memory: http://www.apache.org/
        Source: template.exeString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: template.exeString found in binary or memory: http://www.zeustech.net/
        Source: template.exe, 00000001.00000002.553228537.000000000064A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

        System Summary

        barindex
        Source: template.exe, type: SAMPLEMatched rule: Metasploit Payloads - file msf.exe Author: Florian Roth
        Source: 1.0.template.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Metasploit Payloads - file msf.exe Author: Florian Roth
        Source: 1.2.template.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Metasploit Payloads - file msf.exe Author: Florian Roth
        Source: template.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: template.exe, type: SAMPLEMatched rule: Msfpayloads_msf_10 date = 2017-02-09, hash1 = 3cd74fa28323c0d64f45507675ac08fb09bae4dd6b7e11f2832a4fbc70bb7082, author = Florian Roth, description = Metasploit Payloads - file msf.exe, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.0.template.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Msfpayloads_msf_10 date = 2017-02-09, hash1 = 3cd74fa28323c0d64f45507675ac08fb09bae4dd6b7e11f2832a4fbc70bb7082, author = Florian Roth, description = Metasploit Payloads - file msf.exe, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 1.2.template.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Msfpayloads_msf_10 date = 2017-02-09, hash1 = 3cd74fa28323c0d64f45507675ac08fb09bae4dd6b7e11f2832a4fbc70bb7082, author = Florian Roth, description = Metasploit Payloads - file msf.exe, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: template.exe, 00000001.00000000.286451083.0000000000415000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameab.exeF vs template.exe
        Source: template.exeBinary or memory string: OriginalFilenameab.exeF vs template.exe
        Source: template.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: template.exeVirustotal: Detection: 84%
        Source: template.exeReversingLabs: Detection: 88%
        Source: template.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\template.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: classification engineClassification label: mal76.troj.winEXE@1/0@0/0
        Source: template.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: template.exe
        Source: C:\Users\user\Desktop\template.exeCode function: 1_2_00407050 push esi; ret 1_2_00407053
        Source: C:\Users\user\Desktop\template.exeCode function: 1_2_00405856 push edi; ret 1_2_0040586F
        Source: C:\Users\user\Desktop\template.exeCode function: 1_2_00409860 pushad ; retn 0010h1_2_0040989D
        Source: C:\Users\user\Desktop\template.exeCode function: 1_2_00402861 push 00403120h; retf 1_2_00402883
        Source: C:\Users\user\Desktop\template.exeCode function: 1_2_00402878 push 00403120h; retf 1_2_00402883
        Source: C:\Users\user\Desktop\template.exeCode function: 1_2_00409EA0 push es; iretd 1_2_00409FBB
        Source: C:\Users\user\Desktop\template.exeCode function: 1_2_00409F20 push es; iretd 1_2_00409FBB
        Source: C:\Users\user\Desktop\template.exeCode function: 1_2_004051C2 push eax; retf 1_2_004051C6
        Source: C:\Users\user\Desktop\template.exeCode function: 1_2_004023EB push es; ret 1_2_00402400
        Source: C:\Users\user\Desktop\template.exeCode function: 1_2_004027F4 push eax; ret 1_2_004027F5
        Source: initial sampleStatic PE information: section name: .text entropy: 7.01001868151
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: template.exe, 00000001.00000002.553228537.000000000064A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: template.exe, type: SAMPLE
        Source: Yara matchFile source: 1.0.template.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.template.exe.400000.0.unpack, type: UNPACKEDPE
        Source: C:\Users\user\Desktop\template.exeCode function: 1_2_0046008E WSAStartup,WSASocketA,bind,listen,accept,1_2_0046008E
        Source: C:\Users\user\Desktop\template.exeSocket bind: port: 53Jump to behavior
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception3
        Software Packing
        1
        Input Capture
        1
        Security Software Discovery
        Remote Services1
        Input Capture
        Exfiltration Over Other Network Medium1
        Non-Standard Port
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts3
        Obfuscated Files or Information
        LSASS Memory1
        System Information Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
        Remote Access Software
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 573251 Sample: template.pdf Startdate: 16/02/2022 Architecture: WINDOWS Score: 76 7 Malicious sample detected (through community Yara rule) 2->7 9 Antivirus / Scanner detection for submitted sample 2->9 11 Multi AV Scanner detection for submitted file 2->11 13 2 other signatures 2->13 5 template.exe 2->5         started        process3

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        template.exe84%VirustotalBrowse
        template.exe89%ReversingLabsWin32.Trojan.Retelesh
        template.exe100%AviraTR/Patched.Gen2
        template.exe100%Joe Sandbox ML
        No Antivirus matches
        SourceDetectionScannerLabelLinkDownload
        1.2.template.exe.400000.0.unpack100%AviraTR/Patched.Gen2Download File
        1.0.template.exe.400000.0.unpack100%AviraTR/Patched.Gen2Download File
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.zeustech.net/0%URL Reputationsafe
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.apache.org/licenses/LICENSE-2.0template.exefalse
          high
          http://www.apache.org/template.exefalse
            high
            http://www.zeustech.net/template.exefalse
            • URL Reputation: safe
            unknown
            No contacted IP infos
            Joe Sandbox Version:34.0.0 Boulder Opal
            Analysis ID:573251
            Start date:16.02.2022
            Start time:12:55:54
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 5m 35s
            Hypervisor based Inspection enabled:false
            Report type:full
            Sample file name:template.pdf (renamed file extension from pdf to exe)
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:18
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal76.troj.winEXE@1/0@0/0
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:
            • Successful, ratio: 26.2% (good quality ratio 12.6%)
            • Quality average: 23.4%
            • Quality standard deviation: 25.9%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 7
            • Number of non-executed functions: 1
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
            • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
            • Not all processes where analyzed, report is missing behavior information
            No simulations
            No context
            No context
            No context
            No context
            No context
            No created / dropped files found
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):6.319813352449741
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:template.exe
            File size:73802
            MD5:7b478a52e723de424790f4c0b0658c11
            SHA1:39ebd7b22d816c9fa2690353a4d334e80a2ca909
            SHA256:7e1c7bf2d20218ca328153ee8a0889ca7938dc030c7139efd28845d8c0b54ccf
            SHA512:fb00e1397e35928ea77fd315d3c0c45ec2a879281ca12ce35fd063b8c869fae8bb35febc06f071a2a85794b436c340faf222b0aa5a2419b753bf7107d71c7d5c
            SSDEEP:1536:IUpGe/Dji70cAW5X0WC7qHkT11CJcjw1r1KlGMb+KR0Nc8QsJq39:lhLje6W5gOETfgcjEs4e0Nc8QsC9
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...Y...Y...Y...E...Y..TE...Y...F...Y...F...Y...Y...Y..TQ...Y...z...Y..._...Y..Rich.Y..................PE..L...C.}J...........
            Icon Hash:00828e8e8686b000
            Entrypoint:0x4054cb
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            DLL Characteristics:
            Time Stamp:0x4A7D8443 [Sat Aug 8 13:57:23 2009 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:481f47bbb2c9c21e108d65f52b04c448
            Instruction
            inc edx
            daa
            aaa
            xchg eax, ecx
            aaa
            salc
            stc
            inc ecx
            inc eax
            salc
            cld
            std
            cld
            cwde
            stc
            xchg eax, ecx
            aas
            inc ecx
            wait
            inc eax
            dec eax
            xchg eax, ebx
            inc eax
            wait
            nop
            lahf
            lahf
            xchg eax, ecx
            inc ecx
            daa
            clc
            daa
            cdq
            inc eax
            salc
            daa
            inc ecx
            dec ecx
            lahf
            stc
            xchg eax, edx
            inc ecx
            dec eax
            wait
            stc
            cmc
            cld
            dec ebx
            daa
            clc
            clc
            std
            inc edx
            xchg eax, edx
            cmc
            nop
            stc
            inc eax
            daa
            cmc
            xchg eax, ebx
            cdq
            dec ecx
            xchg eax, ebx
            dec eax
            inc ebx
            inc ebx
            nop
            wait
            inc edx
            inc ecx
            xchg eax, ecx
            dec edx
            clc
            cmc
            jmp 00007F10B50EACF5h
            cmp eax, 270C688Bh
            sal byte ptr [ecx+ecx+50h], FFFFFF9Eh
            nop
            add byte ptr fs:[eax], al
            mov edx, dword ptr [ebp+08h]
            mov edi, dword ptr [esi+14h]
            lea ebp, dword ptr [edi+74FF8514h]
            adc byte ptr [ebx+4F3BF227h], cl
            or byte ptr [esi+46h], dh
            mov eax, edi
            and al, 73h
            test edi, edi
            jne 00007F10B50E9802h
            mov esi, dword ptr [esi+0Ch]
            test esi, esi
            je 00007F10B50E9818h
            push esi
            call 00007F10B50EE602h
            mov edi, dword ptr [ebp-08h]
            mov eax, dword ptr [ebp-04h]
            push eax
            call dword ptr [0040C15Ch]
            add esp, FFFFFFABh
            jc 00007F10B50E97D2h
            je 00007F10B50E986Bh
            mov edx, dword ptr [eax+18508DFCh]
            mov dword ptr [eax-12h], edx
            mov dword ptr [eax], 25005700h
            lea edx, dword ptr [esi+eax]
            mov dword ptr [eax+08h], edi
            mov dword ptr [eax+1Eh], edx
            jmp 00007F10B4AF974Eh
            mov ecx, dword ptr [edi]
            mov dword ptr [ecx+4E8B0847h], edi
            or byte ptr [eax+ecx*8-75h], ch
            inc esi
            Programming Language:
            • [EXP] VC++ 6.0 SP5 build 8804
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0xc76c0x78.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x7c8.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0xc1e00x1c.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0xc0000x1e0.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xa9660xb000False0.814586292614data7.01001868151IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .rdata0xc0000xfe60x1000False0.46142578125DOS executable (COM, 0x8C-variant)5.31839035374IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0xd0000x705c0x4000False0.25634765625data4.4078410232IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .rsrc0x150000x7c80x1000False0.197998046875data1.95829602517IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountry
            RT_VERSION0x150600x768dataEnglishUnited States
            DLLImport
            MSVCRT.dll_iob, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __p___initenv, _XcptFilter, _exit, _onexit, __dllonexit, strrchr, wcsncmp, _close, wcslen, wcscpy, strerror, modf, strspn, realloc, __p__environ, __p__wenviron, _errno, free, strncmp, strstr, strncpy, _ftol, qsort, fopen, perror, fclose, fflush, calloc, malloc, signal, printf, _isctype, atoi, exit, __mb_cur_max, _pctype, strchr, fprintf, _controlfp, _strdup, _strnicmp
            KERNEL32.dllPeekNamedPipe, ReadFile, WriteFile, LoadLibraryA, GetProcAddress, GetVersionExA, GetExitCodeProcess, TerminateProcess, LeaveCriticalSection, SetEvent, ReleaseMutex, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, CreateMutexA, GetFileType, SetLastError, FreeEnvironmentStringsW, GetEnvironmentStringsW, GlobalFree, GetCommandLineW, TlsAlloc, TlsFree, DuplicateHandle, GetCurrentProcess, SetHandleInformation, CloseHandle, GetSystemTimeAsFileTime, FileTimeToSystemTime, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, Sleep, FormatMessageA, GetLastError, WaitForSingleObject, CreateEventA, SetStdHandle, SetFilePointer, CreateFileA, CreateFileW, GetOverlappedResult, DeviceIoControl, GetFileInformationByHandle, LocalFree
            ADVAPI32.dllFreeSid, AllocateAndInitializeSid
            WSOCK32.dllgetsockopt, connect, htons, gethostbyname, ntohl, inet_ntoa, setsockopt, socket, closesocket, select, ioctlsocket, __WSAFDIsSet, WSAStartup, WSACleanup, WSAGetLastError
            WS2_32.dllWSARecv, WSASend
            DescriptionData
            LegalCopyrightCopyright 2009 The Apache Software Foundation.
            InternalNameab.exe
            FileVersion2.2.14
            CompanyNameApache Software Foundation
            CommentsLicensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License athttp://www.apache.org/licenses/LICENSE-2.0Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
            ProductNameApache HTTP Server
            ProductVersion2.2.14
            FileDescriptionApacheBench command line utility
            OriginalFilenameab.exe
            Translation0x0409 0x04b0
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            No network behavior found
            050100s020406080100

            Click to jump to process

            050100s0.00123MB

            Click to jump to process

            • File
            • Network

            Click to dive into process behavior distribution

            Target ID:1
            Start time:12:56:49
            Start date:16/02/2022
            Path:C:\Users\user\Desktop\template.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\template.exe"
            Imagebase:0x400000
            File size:73802 bytes
            MD5 hash:7B478A52E723DE424790F4C0B0658C11
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low

            Execution Graph

            Execution Coverage

            Dynamic/Packed Code Coverage

            Signature Coverage

            Execution Coverage:0.7%
            Dynamic/Decrypted Code Coverage:17.5%
            Signature Coverage:15%
            Total number of Nodes:40
            Total number of Limit Nodes:0
            Show Legend
            Hide Nodes/Edges
            execution_graph 2502 406d44 VirtualAlloc 2503 406d5e 2502->2503 2539 402884 qsort 2540 40289d 2539->2540 2547 406d24 2548 406d84 2547->2548 2549 406d2c VirtualAlloc 2547->2549 2551 406d5e 2549->2551 2504 460000 2507 46008e 2504->2507 2508 4600a1 WSAStartup 2507->2508 2509 4600b4 2508->2509 2509->2509 2510 4600b7 WSASocketA bind 2509->2510 2511 4600d9 listen accept 2510->2511 2512 46000c 2510->2512 2511->2512 2518 401e28 2519 401e40 2518->2519 2520 401e57 printf 2519->2520 2541 40114a _strdup 2542 401513 2541->2542 2521 4054cb 2522 405515 2521->2522 2525 406cd1 2522->2525 2526 406cde VirtualAlloc 2525->2526 2528 406d5e 2526->2528 2556 4053ec 2558 405420 2556->2558 2557 406cd1 VirtualAlloc 2559 406a01 2557->2559 2558->2557 2552 40a3d0 2553 40a410 2552->2553 2554 40a3dd GetLastError 2552->2554 2555 40a3f9 2554->2555 2537 4010f7 atoi 2538 401513 2537->2538 2516 404858 2517 404861 malloc 2516->2517 2529 406cdc 2530 406cde VirtualAlloc 2529->2530 2532 406d5e 2530->2532

            Executed Functions

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 46008e-4600b3 WSAStartup 2 4600b4-4600b5 0->2 2->2 3 4600b7-4600d7 WSASocketA bind 2->3 4 460131-46013b 3->4 5 4600d9-4600eb listen accept 3->5 7 4600f2-460102 5->7 7->4 9 460104-460118 7->9 11 460119-460128 9->11 11->4 13 46012a-46012e 11->13 13->11 14 460130 13->14
            APIs
            • WSAStartup.WS2_32(006B8029,00000190,?,?,5F327377,00003233), ref: 004600AF
            • WSASocketA.WS2_32(E0DF0FEA,00000002,00000001,00000000,?,?,5F327377,00003233), ref: 004600C0
            • bind.WS2_32(6737DBC2,?,?,00000010,35000002,?,?,5F327377,00003233), ref: 004600D3
            • listen.WS2_32(FF38E9B7,?,?,?,00000010,35000002,?,?,5F327377,00003233), ref: 004600DF
            • accept.WS2_32(E13BEC74,?,?,?,?,00000010,35000002,?,?,5F327377,00003233), ref: 004600E7
            Memory Dump Source
            • Source File: 00000001.00000002.553169165.0000000000460000.00000040.00000800.00020000.00000000.sdmp, Offset: 00460000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_460000_template.jbxd
            Similarity
            • API ID: SocketStartupacceptbindlisten
            • String ID:
            • API String ID: 2467102526-0
            • Opcode ID: 593f94881237ca3f197cc9fb9381ebee9599fb63837a0479475510fb76dce9ba
            • Instruction ID: 5f50320c8390d63fd898fe873cbdfb99b4009d77504e3eed3f15e76a7fb5218c
            • Opcode Fuzzy Hash: 593f94881237ca3f197cc9fb9381ebee9599fb63837a0479475510fb76dce9ba
            • Instruction Fuzzy Hash: 3D114CB06C129D3AE63121639C4BFAB3D1CCF86B98F550065B744AA1C1E9CAD84081BE
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 15 406d24-406d2a 16 406d97-406da6 15->16 17 406d2c-406d5e VirtualAlloc call 406e74 15->17 19 406db8-406dd1 16->19 25 406dd7-406e00 19->25 26 406e1e-406e6f 19->26 25->26 30 406e06-406e0b 25->30 26->19 30->26
            APIs
            • VirtualAlloc.KERNELBASE(E553A458,00000000,0000013B,00001000,00000040), ref: 00406D4F
            Memory Dump Source
            • Source File: 00000001.00000002.553124603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.553119517.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553145810.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553154327.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553163839.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_template.jbxd
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: d7245893d358433f4a450d3ead1c79ac7f0a57231bae86477dd6ce0a49a29391
            • Instruction ID: 584e8247d4550be00e29aae199d21f6f378147c4511b4a5bb70b69b240c24ce8
            • Opcode Fuzzy Hash: d7245893d358433f4a450d3ead1c79ac7f0a57231bae86477dd6ce0a49a29391
            • Instruction Fuzzy Hash: 73F0E93438A3089AC51451208C41BB5314E4B96700F56343BA5037B6D2CA78943261DF
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 37 406ce5-406d5e VirtualAlloc call 406e74
            APIs
            • VirtualAlloc.KERNELBASE(E553A458,00000000,0000013B,00001000,00000040), ref: 00406D4F
            Memory Dump Source
            • Source File: 00000001.00000002.553124603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.553119517.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553145810.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553154327.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553163839.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_template.jbxd
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: a873aae369ee458cd9b0ce45941cf3b66bca200e5782d1ff92ca9899ff540d26
            • Instruction ID: f3be518b7ce71daa766dc07e6b8e919162743063083b6967f693c4256261822d
            • Opcode Fuzzy Hash: a873aae369ee458cd9b0ce45941cf3b66bca200e5782d1ff92ca9899ff540d26
            • Instruction Fuzzy Hash: BEE0D1653CD39857D30156705C437E566951F17744F6A203BD18B7A1C7E5FC4601510D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 43 406cd1-406d5e VirtualAlloc call 406e74
            APIs
            • VirtualAlloc.KERNELBASE(E553A458,00000000,0000013B,00001000,00000040), ref: 00406D4F
            Memory Dump Source
            • Source File: 00000001.00000002.553124603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.553119517.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553145810.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553154327.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553163839.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_template.jbxd
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: 98589d5addc67291034c61ac4b0415e4ca9bb40c6ddad1d9dd63b07573a8f646
            • Instruction ID: 374054f40fdc1ed778e2d56b39737827b70dd4bc062a40895275048749a79ad5
            • Opcode Fuzzy Hash: 98589d5addc67291034c61ac4b0415e4ca9bb40c6ddad1d9dd63b07573a8f646
            • Instruction Fuzzy Hash: 26D09E657CE215A2E50151245C52FB5518C4B5FB51E733437A64B7B1C7D9BC1A23304E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 52 406cdc-406d5e VirtualAlloc call 406e74
            APIs
            • VirtualAlloc.KERNELBASE(E553A458,00000000,0000013B,00001000,00000040), ref: 00406D4F
            Memory Dump Source
            • Source File: 00000001.00000002.553124603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.553119517.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553145810.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553154327.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553163839.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_template.jbxd
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: ba90182bb653eca8aff04cb969ba7306b2fe0abdd48cf3cd1e0bb80bfe822ce1
            • Instruction ID: fa635b14704d3018ab6d5506e747bf22b8d59182ea07f98a3c3efc379f4229f7
            • Opcode Fuzzy Hash: ba90182bb653eca8aff04cb969ba7306b2fe0abdd48cf3cd1e0bb80bfe822ce1
            • Instruction Fuzzy Hash: 84D05E257CE258E3E50111205C92FF5128D0F1FB00E733476A28B3A1C7D9AC1A22604E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 61 406d16-406d5e VirtualAlloc call 406e74
            APIs
            • VirtualAlloc.KERNELBASE(E553A458,00000000,0000013B,00001000,00000040), ref: 00406D4F
            Memory Dump Source
            • Source File: 00000001.00000002.553124603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.553119517.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553145810.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553154327.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553163839.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_template.jbxd
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: 1801661d45174c04168720857cb5e05e5296c0fd4f4a26ddebff298239cdf5cb
            • Instruction ID: 2c49d93b144fe78f6ae223a1496384c76529cd4d0ab7d6499107e53da005edf2
            • Opcode Fuzzy Hash: 1801661d45174c04168720857cb5e05e5296c0fd4f4a26ddebff298239cdf5cb
            • Instruction Fuzzy Hash: DEC012253C9258A7E50156208C87F7A50C44B2AB40EA2342AB28BBA1C6A8E82E12104E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 67 406d44-406d57 VirtualAlloc 68 406d5e 67->68 69 406d59 call 406e74 67->69 69->68
            APIs
            • VirtualAlloc.KERNELBASE(E553A458,00000000,0000013B,00001000,00000040), ref: 00406D4F
            Memory Dump Source
            • Source File: 00000001.00000002.553124603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.553119517.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553145810.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553154327.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553163839.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_template.jbxd
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: 63b4029ab68ee12c7da69d4456af9f479a0586b81f3a042f8edfb37722aaa58d
            • Instruction ID: 19786778f407c61e8071ebb6ba6b0ca0db728d1b8757c4a299e73a6940fff132
            • Opcode Fuzzy Hash: 63b4029ab68ee12c7da69d4456af9f479a0586b81f3a042f8edfb37722aaa58d
            • Instruction Fuzzy Hash: B0B0926A3687116B2A00F2BD78A1A1F22DB0A6B714365342AE112E7293EE588E81419D
            Uniqueness

            Uniqueness Score: -1.00%

            Non-executed Functions

            Memory Dump Source
            • Source File: 00000001.00000002.553124603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000001.00000002.553119517.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553145810.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553154327.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000001.00000002.553163839.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_400000_template.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8335fb1aad4a4c39b9d2c000792769a974b2bb3596afd11cfbf285931f669cd2
            • Instruction ID: 76f02fd106aead2f4b637b2797871ce2080fca86f8b6fc71234094765ec6c179
            • Opcode Fuzzy Hash: 8335fb1aad4a4c39b9d2c000792769a974b2bb3596afd11cfbf285931f669cd2
            • Instruction Fuzzy Hash: 7DD0C96550434EABAB088E14C841CBAF77DAA4B630B04B749AC34175D1D670F9408798
            Uniqueness

            Uniqueness Score: -1.00%