Windows Analysis Report
NXK7tvxiAh.exe

Overview

General Information

Sample name: NXK7tvxiAh.exe
renamed because original name is a hash value
Original sample name: 4f121ea16b6d93625750722b82b68566.exe
Analysis ID: 1528612
MD5: 4f121ea16b6d93625750722b82b68566
SHA1: cf11c14525ae058bc653724281965314550b0c64
SHA256: d7ac0037bcddd94c672402c04523ecf749de0156e550e1eec5d91abf29a7ddb2
Tags: 64exeMeterpretertrojan
Infos:

Detection

Metasploit
Score: 96
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
Machine Learning detection for sample
Detected TCP or UDP traffic on non-standard ports
Entry point lies outside standard sections
Internet Provider seen in connection with other malware
PE file contains an invalid checksum
PE file contains sections with non-standard names
Program does not show much activity (idle)
Yara signature match

Classification

AV Detection

barindex
Source: NXK7tvxiAh.exe Avira: detected
Source: NXK7tvxiAh.exe Malware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "47.239.242.141", "Port": 6666}
Source: NXK7tvxiAh.exe ReversingLabs: Detection: 92%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: NXK7tvxiAh.exe Joe Sandbox ML: detected
Source: global traffic TCP traffic: 192.168.2.5:49704 -> 47.239.242.141:6666
Source: Joe Sandbox View ASN Name: CHARTER-20115US CHARTER-20115US
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: unknown TCP traffic detected without corresponding DNS query: 47.239.242.141
Source: C:\Users\user\Desktop\NXK7tvxiAh.exe Code function: 0_2_00000001400040D6 LoadLibraryA,WSASocketA,connect,recv,closesocket, 0_2_00000001400040D6

System Summary

barindex
Source: NXK7tvxiAh.exe, type: SAMPLE Matched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
Source: NXK7tvxiAh.exe, type: SAMPLE Matched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
Source: 0.0.NXK7tvxiAh.exe.140000000.0.unpack, type: UNPACKEDPE Matched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
Source: 0.0.NXK7tvxiAh.exe.140000000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
Source: 0.2.NXK7tvxiAh.exe.140000000.0.unpack, type: UNPACKEDPE Matched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
Source: 0.2.NXK7tvxiAh.exe.140000000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
Source: 00000000.00000000.2017931866.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
Source: 00000000.00000000.2017931866.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
Source: 00000000.00000002.3257863596.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
Source: 00000000.00000002.3257863596.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
Source: NXK7tvxiAh.exe, type: SAMPLE Matched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
Source: NXK7tvxiAh.exe, type: SAMPLE Matched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
Source: 0.0.NXK7tvxiAh.exe.140000000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
Source: 0.0.NXK7tvxiAh.exe.140000000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
Source: 0.2.NXK7tvxiAh.exe.140000000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
Source: 0.2.NXK7tvxiAh.exe.140000000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
Source: 00000000.00000000.2017931866.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
Source: 00000000.00000000.2017931866.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
Source: 00000000.00000002.3257863596.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
Source: 00000000.00000002.3257863596.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY Matched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
Source: classification engine Classification label: mal96.troj.winEXE@1/0@0/1
Source: C:\Users\user\Desktop\NXK7tvxiAh.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: NXK7tvxiAh.exe ReversingLabs: Detection: 92%
Source: C:\Users\user\Desktop\NXK7tvxiAh.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\NXK7tvxiAh.exe Section loaded: mswsock.dll Jump to behavior
Source: NXK7tvxiAh.exe Static PE information: Image base 0x140000000 > 0x60000000
Source: initial sample Static PE information: section where entry point is pointing to: .aycs
Source: NXK7tvxiAh.exe Static PE information: real checksum: 0x58ba should be: 0x5a72
Source: NXK7tvxiAh.exe Static PE information: section name: .aycs
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: NXK7tvxiAh.exe, 00000000.00000002.3257704414.00000000005F6000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected

Remote Access Functionality

barindex
Source: Yara match File source: NXK7tvxiAh.exe, type: SAMPLE
Source: Yara match File source: 0.0.NXK7tvxiAh.exe.140000000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.NXK7tvxiAh.exe.140000000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000000.2017931866.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.3257863596.0000000140004000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs